Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
optimization
test
Solovey-Strassen fast exponentiation probablistic test binary algorithm
Solovey-Strassen
Software algorithms
Scalability
Resiliency
pubcrawl
probability test
probability
Probabilistic logic
Algorithm
Jacobian matrices
Jacobi symbol
Information systems
Fermat's little theorem
Fermat
exponentiation
C\# programming language
C\# languages
Cryptography
binary exponentiation
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
Crypto-Aided Bayesian Detection of False Data in Short Messages
Submitted by grigby1 on Mon, 12/30/2019 - 2:21pm
Human behavior
Wireless communication
signal processing
short messages
Resiliency
resilience
Relays
pubcrawl
probability
Physical layer
missed detection
maximum a posteriori probability rule
Map
low overhead
low latency
lightweight cryptographic detection
Bayes methods
False Data Injection
False Data Detection
false data
false alarm
Electrostatic discharges
detection outcomes
detection error
detection accuracy
cyber physical systems
Cryptography
cryptographic detection
crypto-aided Bayesian detection framework
Conferences
composability
Bayesian detection
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
A Multiple Objective PSO-Based Approach for Data Sanitization
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
resilience
privacy-preserving and security
nondominated solutions
multiple objective PSO-based approach
multiple objective
multiobjective particle swarm optimization-based framework
grid-based algorithm
Itemsets
genetic algorithms
Data Sanitization
Compositionality
security
probability
privacy
Data mining
particle swarm optimization
particle swarm optimisation
optimization
pubcrawl
Human behavior
Task Analysis
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
physical layer security
Wireless communication
Signal to noise ratio
security enhancement performance
security
secret keys
secret key generation
Resiliency
resilience
received signal phase quantisation
Quantization (signal)
pubcrawl
probability
physical-layer security
physical layer-based key derivation procedure
adversary signal transmission
Physical layer
phase quantization regions
phase jamming attack
phase attack
Metrics
key generation technique
jamming attack
Jamming
Cryptography
composability
Communication system security
communication management
communication channel networks
biblio
Physical Layer Security in Wireless Information and Power Transfer Millimeter Wave Systems
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
SWIPT
resilience
Resiliency
secrecy performance
secrecy probability
secure transmission performance
simulation results
simultaneous wireless information
stochastic geometry framework
reliable transmission performance
Switches
telecommunication network reliability
telecommunication security
Throughput
wireless channels
Wireless communication
wireless sensor networks
Communication system security
pubcrawl
probability
power transfer millimeter wave ultra-dense network
power transfer millimeter wave systems
physical layer security performance
physical layer security
network parameters
Millimeter-wave (mmWave)
Metrics
Information rates
energy-information coverage probability
energy coverage
effective secrecy throughput
confidential information rate
composability
biblio
Power Grid Security Improvement by Remedial Action Schemes Using Vulnerability Assessment Based on Fault Chains and Power Flow
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
power system security
vulnerable transmission lines
vulnerability index
vulnerability assessment
vulnerability assessemnt
resilient power grid
Resiliency
resilience
remedial action schemes
remedial action scheme
pubcrawl
probability
power transmission reliability
power transmission lines
power transmission faults
power system stability
Cascading Failures
Power system protection
power system faults
power grids
power grid vulnerability analysis
power grid security improvement
power flow-based method
power flow
Metrics
Load flow
large-scale blackout
Indexes
IEEE 14-bus test system
fault chains
fault chain theory
composability
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »