Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 11:31am
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
biblio
Optimality of inference in hierarchical coding for distributed object-based representations
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
hierarchical sparse coding
standards
representation learning
pubcrawl
optimisation
NP-hard optimization
near-optimal codes
multiscale representation
Matching pursuit algorithms
learning (artificial intelligence)
L0-norm constraint
inference mechanisms
hierarchical systems
complex synthetic datasets
greedy inference algorithm
greedy algorithms
encoding
distributed processing
distributed object-based representations
Dictionaries
data compression
convolutional matching pursuit
Convolutional codes
convolution
Compositionality
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
A generalized optimization framework for control plane in tactical wireless networking
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
optimisation
wireless networks
wireless multihop tactical networking
Transmitters
throughput maximization problem
Throughput
telecommunication control
tactical wireless networking
spread spectrum communication
seamless multihop communications
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
optimization
Ad hoc networks
network layers
multihop tactical wireless networks
military communication
Metrics
Interference
Human Factors
human factor
Human behavior
global network optimization framework
generalized optimization framework
crosslayer optimization framework
control plane
collaboration
clean slate
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
biblio
Security beamforming algorithms in multibeam satellite systems
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
BF weight vectors
signal processing security
ZF BF algorithm
zero-forcing BF algorithms
zero-forcing
the sum of achievable secrecy rate
SLNR BF algorithm
signal-to-leakage-and-noise ratio
security beamforming algorithms
satellite communication
power allocation coefficients
optimization problem
on-board satellite transmit power constraint
multibeam satellite communication system
multibeam satellite
legitimate user
security
achievable secrecy rate
Signal to noise ratio
Satellites
Satellite broadcasting
telecommunication security
array signal processing
physical layer security
Interference
optimization
optimisation
composability
privacy
Resiliency
pubcrawl
Metrics
biblio
Frequency diverse array beamforming for physical-layer security with directionally-aligned legitimate user and eavesdropper
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
Frequency diversity
signal processing security
telecommunication security
secrecy rate maximization problem
radiocommunication
radio transmitters
physical-layer security
PHY security problem
Phased arrays
OFDM
mmWave transmissions
millimeter wave transmission
highly directional transmission feature
frequency offsets
Frequency modulation
security
frequency diverse array beamforming
FDA beamforming
directionally-aligned LU
directionally-aligned legitimate user
artificial noise
angle-range dependent beampattern
array signal processing
optimisation
composability
privacy
Resiliency
pubcrawl
Metrics
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »