Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time complexity
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Adversarial mRMR against Evasion Attacks
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
security
novel adversary-aware feature selection algorithm
pattern classification
Perfect Knowledge attack scenarios
popular filter algorithms
pubcrawl
Resiliency
robust feature selection algorithms
Scalability
mRMR
security of data
security sensitive applications
Time complexity
Traditional Wrapped Feature Selection algorithm
Training
TWFS
WAFS
wrapped adversarial feature selection algorithm
Feature Selection
adversarial mRMR
adversary attacks
Adversary Models
Classification algorithms
computational complexity
evasion attacks
FAFS
feature extraction
adversarial feature selection
feature selection process
filter model
filtering algorithms
Human behavior
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
biblio
Cross-layer security based on optical CDMA and algorithmic cryptography
Submitted by grigby1 on Wed, 01/10/2018 - 11:21am
optical decoding
transmitter
Time complexity
telecommunication security
Signal to noise ratio
security
Resiliency
pubcrawl
physical layer encryption
optical transmitters
optical receivers
optical network
optical information processing
optical encoding
Adaptive optics
Optical code division multiple access (OCDMA)
optical CDMA
Multiaccess communication
encoding
decryption algorithm
Decoding
Cryptography
Cross-Layer Security
Cross Layer Security
composability
code division multiple access
algorithmic cryptography
biblio
An Investigation on Tree-Based Tags Anti-collision Algorithms in RFID
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
Algorithm design and analysis
Anti-collision algorithm
Deterministic algorithm
Electronic tags
Heuristic algorithms
Human behavior
Human Factors
pubcrawl
radio frequency identification
radiofrequency identification
Resiliency
RFID
RFIDs
Satellite broadcasting
security
Time complexity
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 8:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 8:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Thu, 04/30/2015 - 11:49am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
« first
‹ previous
1
2
3