Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
intrication operator
turnover operator
substitution box (S-Box)
strict avalanche criterion
S-boxes
pubcrawl
probability
periodicity property
periodicity measure
periodic iterated function (PIF)
nonlinear substitution boxes
mutual operator
mathematical operators
linear approximation probability
linear approximation
ancient Chinese I-Ching philosophy
identity measure
ICO
I-Ching operators (ICOs)
I-Ching operators
I-Ching
encryption
differential approximation probability
Cryptography
compositionality measure
Compositionality
Boolean functions
Boolean function
approximation theory
biblio
IoT Trajectory Data Privacy Protection Based on Enhanced Mix-zone
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
privacy protection
Control Theory and Privacy
weighted undirected graph
user flow-based algorithm
traditional Mix-zone
Mix-zone
migration probability
IoT trajectory data privacy protection
enhanced Mix-zone
attack method
data sets
cyber physical systems
computer network security
cyber-physical systems
probability
privacy
graph theory
pubcrawl
Human behavior
Resiliency
information security
Internet of Things
data privacy
Scalability
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Physical Layer Security of a Two-Hop Mixed RF-FSO System in a Cognitive Radio Network
Submitted by grigby1 on Fri, 09/18/2020 - 1:55pm
physical layer security
dual-hop transmission
end-to-end signal-to-noise-ratio
free space optical link
FSO
FSO links
gamma distribution
Gamma-Gamma distribution
licensed primary user
Nakagami channels
optical links
cognitive-radio system
physical layer security performance
PU receiver
relay
relaying
RF links
secrecy outage probability
two-hop mixed RF-FSO system
unlicensed secondary user
Cognitive Radio Security
cooperative communication
pubcrawl
resilience
Resiliency
Radio frequency
telecommunication security
Signal to noise ratio
Receivers
probability
telecommunication network reliability
Capacity planning
security
Relays
Rayleigh channels
Interference
cognitive radio
amplify and forward communication
asymmetric radio frequency link
atmospheric turbulence
average secrecy capacity
Cognitive Radio Network
biblio
Combined Compressive Sampling Techniques and Features Detection using Kullback Leibler Distance to Manage Handovers
Submitted by aekwall on Mon, 09/14/2020 - 12:29pm
Akaike information criterion
Small Cells
signal sampling
received signal probability density function
primary signals sparsity
manage handovers
Kullback Leibler Distance
Handovers
Handover technique
features detection
Distribution Analysis Detector
Compressive Sampling Techniques
Compressive Sampling algorithm
compressive sampling
Akaike weights
Akaike Weight
Detectors
Probability density function
compressed sensing
mobility management (mobile radio)
Handover
signal detection
Complexity theory
probability
privacy
Computational modeling
composability
pubcrawl
Resiliency
feature extraction
cyber-physical systems
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
Crypto Polar Codes based on Pseudorandom Frozen Bits Values and Indices
Submitted by aekwall on Tue, 09/08/2020 - 10:06am
original encoding cipher key
decoding obscurity
discrete memoryless channel
discrete memoryless channel capacity
encoder security
generated sequences
grouping polar codes
modern communication systems
MT PRNG
one-bit change
decoding cipher key
originally sent information data bits
polarized bit channels
pseudorandom frozen bits values
secret Mersenne- Twister pseudo
secret pre-shared initial state
secured system
system secrecy
talented coding technique
error statistics
telecommunication security
Resiliency
pubcrawl
composability
Metrics
probability
channel capacity
channel coding
Decoding
Cryptography
random number generation
pseudorandom number generator
polar codes
High reliability
232-bit ciphering key
BER probability
crypto polar codes
crypto-system ciphering key
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »