Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Filtering
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 9:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
biblio
Adaptive Multitemporal SAR Image Filtering Based on the Change Detection Matrix
Submitted by BrandonB on Wed, 05/06/2015 - 8:28am
matrix algebra
Time series analysis
time series
TerraSAR-X image acquisition
temporal evolution analysis
temporal adaptive filtering
synthetic aperture radar (SAR) image time series
synthetic aperture radar
speckle
remote sensing
radar imaging
radar detection
parking occupation
Noise
adaptive filters
Indexes
glacier surface evolution
Filtering
CV
coefficient of variation (CV)
coefficient of variation
change detection matrix
Change detection
Chamonix-Mont-Blanc test-site
CDM
adaptive spatiotemporal neighborhood
adaptive multitemporal SAR image filtering approach
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Countering anti-forensics of median filtering
Submitted by BrandonB on Mon, 05/04/2015 - 10:30am
image pixel difference distribution restoration
statistical fingerprints
statistical analysis
Radiation detectors
pixel difference
Noise
median filters
median filtering traces
median filtering
image restoration
anti-forensic
Image forensics
Image coding
Forensics
Filtering
Discrete Fourier transforms
digital images
Detectors
antiforensics countering
antiforensic method
biblio
Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:51am
mobility management
WMN
wireless mesh networks
vehicular networks
telecommunication security
technological convergence
security
secure mobility scheme
packet delivery ratio
network access
negative effects
Monitoring
mobility management (mobile radio)
ARP packets flooding
Mobility
Mobile radio mobility management
MIRF
malicious ARP requests
IP networks
internet
infrastructure-based vehicular networks
handoffs
Floods
flooding attacks mitigation
Flooding Attacks
Filtering
biblio
Profiling stationary crowd groups
Submitted by BrandonB on Fri, 05/01/2015 - 8:41am
object detection
visual feature extraction
video surveillance
video signal processing
Trajectory
tracking
stationary crowd groups profiling
stationary crowd group detection
stationary crowd detection algorithm
Stationary crowd detection
stationary crowd analysis
spatial-temporal filtering
quantitative analysis
Color
Noise
motion filtering
Indexes
image motion analysis
foreground pixel
filtering theory
Filtering
feature extraction
estimation
crowd video surveillance
crowd descriptors
biblio
A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems
Submitted by BrandonB on Fri, 05/01/2015 - 8:29am
multiple privacy servers
video surveillance images
video surveillance
video sharing
video coding
unmanned aerial systems
UAS
surveillance operator
surveillance
Streaming media
Servers
server-based real-time privacy protection scheme
sanitized video
Privacy Policy
privacy
on-board processing unit
camera software
Key Distribution
Kerberos protocol
internet
image processing algorithms
filtering strategies
filtering algorithms
Filtering
encrypted video stream
data privacy
Cryptography
cloud-based servers
cloud-based privacy servers
civilian airspace
Cameras
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 12:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic
« first
‹ previous
1
2
3
4
5
6
7
8