Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
renewable distributed energy resource aggregators
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
encrypted communications
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
transport protocols
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
Cryptography
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Secrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
SWIPT
random terminals
Resiliency
Scalability
secrecy outage probability analysis
secrecy performance
security
simultaneous wireless information and power transfer
SOP
random channel characteristics
System performance
telecommunication power management
telecommunication security
telecommunication terminals
transmitter
typical indoor VLC system
Visual Light Communications Security
wireless channels
optical receivers
free-space optical communication
indoor communication
indoor visible light communications
inductive power transmission
information receiver
light emitting diodes
lower bound
Metrics
energy receiver
passive information eavesdropper
physical-layer data
physical-layer data secure transmission
power system reliability
probability
Probability density function
pubcrawl
radiofrequency power transmission
biblio
Proposal of Equal-Weight (2, 2) Visual Secret Sharing Scheme on VN-CSK Illumination Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Scalability
Modified Pseudo-Orthogonal M-sequence
occurence probability
optical transmitters
orthogonal codes
probability
pubcrawl
Receivers
Resiliency
Metrics
secret data
telecommunication security
variable N-parallel code-shift-keying system
Visual Light Communications Security
visual secret sharing scheme
VN-CSK illumination light communication
VN-CSK system
adjacent illumination light interference
m-sequences
lighting function
lighting
light signal
light emitting diodes
indoor visible light communication channel
illumination light overlapping area
free-space optical communication
error statistics
Distributed databases
dimming control problem
data communication
Cryptography
constant illuminance
bit error rate performance
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
biblio
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Submitted by grigby1 on Thu, 07/09/2020 - 1:58pm
privacy analysis
word representations
vast data stores
utility experiments highlight
user privacy
training machine learning models
text analysis
supporting data driven decisions
semantic generalization
Scalability
Resiliency
resilience
pubcrawl
proof satisfying dx-privacy
probability
privacy experiments
arbitrary piece
privacy
nonHamming distance metrics
learning (artificial intelligence)
Human Factors
Human behavior
high dimensional hyperbolic space
hierarchical representations
expected privacy
downstream machine learning models
document redaction
differential privacy
Data Sanitization
data privacy
data deletion
Compositionality
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »