Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time
Submitted by BrandonB on Tue, 05/05/2015 - 12:39pm
streaming
red-green-blue-depth data
rescue robots
response robot
RGB images
RGB-D cameras
RGB-D data streaming
robot vision
robots
Servers
point cloud
tethers
Three-dimensional displays
urban search and rescue
USAR
USAR operations
video
video streaming
Wireless communication
wireless radio
disaster environment
3D depth data capture
aerial robots
aerospace robotics
Cameras
Compression
Computers
computing power requirements
data compression
data throughput
3D
Hardware
Image coding
image colour analysis
live streaming
lossless compression scheme
lossy compression scheme
low-power embedded computing equipment
Microsoft Kinect
mobile robots
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
attack graph analysis
attack graphs
attack surface
authentication
graph theory
information security
Measurement
security frameworks
security of data
Servers
Software
Vectors
biblio
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
noncolluding external servers
Servers
secure recommender system
secure multi-party computation
secret sharing
recommender systems
Protocols
protocol specification
preprocessing phase
preprocessing
adversarial model
malicious model
Cryptography
Cryptographic Protocols
computer network security
Computational modeling
collaborative filtering
client-server systems
authentication
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
biblio
Quantifying cyber-resilience against resource-exhaustion attacks
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
Queueing analysis
stress-strain curve
Stress
Strain
simple queuing system
Servers
security of data
resource-exhaustion attacks
resilience
queuing theory
queueing theory
cyber security
networked queuing systems
Mechanical Engineering
material science
linguistic terms
Information systems
information sciences
information science
engineering terms
cyber-resilience quantification
cyber systems
biblio
Efficient search on encrypted data using bloom filter
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
data theft
storage cost reduction
Servers
sentence search
search operations
information retrieval
Information filters
Indexes
filtering algorithms
Encrypted Search
efficient encrypted data search
document handling
document decryption
approximate search
data structures
data misuse
data loss
Cryptography
cryptographic techniques
cost reduction
computer science
cloud services
Cloud Computing
case sensitive search
Bloom filter
Approximate Search and Bloom Filter
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
SDN-based solutions for Moving Target Defense network protection
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
MTD
software-defined networking
Software Defined Networks
Servers
SDN-based solutions
SDN-based MTD methods
SDN
Reconnaissance
Ports (Computers)
Payloads
network-based MTD techniques
Algorithm design and analysis
moving target defense network protection
moving target defense
delays
countermeasures attackers
computer network security
Cisco onePK
Cisco One Platform Kit
central control point
attack surface obfuscation
« first
‹ previous
…
82
83
84
85
86
87
88
89
90
…
next ›
last »