Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
False Data Injection Attack Detection Before Decoding in DF Cooperative Relay Network
Submitted by grigby1 on Wed, 06/30/2021 - 3:19pm
outage probability
unified error sufficient statistic
Signal to noise ratio
Resiliency
resilience
relay networks (telecommunication)
pubcrawl
probability
power system reliability
Physical layer
composability
Human Factors
Human behavior
FDI attack detection
False Data Detection
DF cooperative relay network
Detectors
Decoding
cyber physical systems
biblio
Prediction of Optimal Power Allocation for Enhancing Security-Reliability Tradeoff with the Application of Artificial Neural Networks
Submitted by aekwall on Thu, 05/13/2021 - 11:33am
power system reliability
cyber physical systems
threshold-selection relay
security-reliability tradeoff
power allocation weight
probability
Relays
physical layer security
Artificial Neural Networks
security
Manganese
Signal to noise ratio
Reliability
Metrics
policy-based governance
pubcrawl
Resiliency
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Information-theoretic security in wireless multicasting
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
multicast communication
wireless multicasting
transmission rate
secrecy multicast mutual information
quasistatic Rayleigh fading channel
nonzero secrecy
Multicasting
multicast mutual information
informationtheoretic security
information theoretic formulation
eavesdropper's channel
client receiver
analytical expression
outage probability
information theoretic security
transmitter
security of data
Rayleigh fading
radio receivers
radio transmitters
Rayleigh channels
eavesdropper
probability
Phasor measurement units
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
telecommunication security
Scalability
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Chinese Character Captcha Sequential Selection System Based on Convolutional Neural Network
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
feature extraction
word processing
word order restoration
word order recovery
Task Analysis
single Chinese character data
security of data
rotation transformation
recognition
pubcrawl
probability
Neural networks
natural language processing
image segmentation
Human behavior
handwritten character recognition
10-layer convolutional neural network
detection
convolutional neural networks
convolutional neural nets
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CNN
Chinese character recognition sub-process
Chinese character detection
Chinese character captcha sequential selection system
Chinese character captcha recognition
Chinese character
character recognition
captchas
CAPTCHA
affine transformation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »