Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image edge detection
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
graph theory
security of data
security
Scalability
Resiliency
real-world insider threat data
pubcrawl
Organizations
Metrics
malicious threat groups
machine learning
learning (artificial intelligence)
Insider Threat Detection
Image edge detection
Anomaly Detection
graph convolutional networks
GCN
fraud detection
fraud
feature extraction
edge detection
Data models
convolutional neural nets
composability
associated threat groups
anomaly detection model
anomaly detection applications
biblio
Network Scanning and Mapping for IIoT Edge Node Device Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
pseudorandom periodic manner
Metrics
microcontroller units
microcontrollers
Monitoring
network scanning
network services
performance evaluation
predictive maintenance
MCU
pubcrawl
Resiliency
Scalability
scanning procedure
security
security of data
Servers
building block
light emitting diodes
Internet of Things
industrial networks
Industrial Internet of Things
industrial environment
industrial control
Image edge detection
IIoT edge node sensors
IIoT edge node device security
iiot
Hardware
edge device
edge detection
computer network security
composability
biblio
Research on Iris Edge Detection Technology based on Daugman Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 1:03pm
Hough algorithm
security
Scalability
Resiliency
pubcrawl
personal privacy
Metrics
Iris recognition
iris edge detection technology
Image edge detection
identity technology
Identity Security
biometrics (access control)
highly confidential privacy
frequency-domain analysis
Fingerprint recognition
face recognition
edge detection
daugman algorithm
data privacy
current society
convolution
composability
Calculus
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Submitted by aekwall on Mon, 03/30/2020 - 11:34am
meta data
provenance graph construction
Phylogeny
Painting
online multimedia
noncontent-based information
metadata-based inferences
image provenance analysis
cultural analytics
automated provenance analysis
Provenance
inference mechanisms
Semantics
visualization
Task Analysis
digital image forensics
Image forensics
multimedia computing
video signal processing
metadata
internet
Metrics
Image edge detection
graph theory
composability
pubcrawl
Human behavior
Resiliency
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 11:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
biblio
Cipher Modification Against Steganalysis Based on NIST Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
Image edge detection
testing
steganography detection
Steganography
steganalytic method
pubcrawl
privacy
NIST tests steganalysis
NIST
Metrics
Image Steganography
arithmetic codes
Image coding
encryption
encoding
edge detection
Cryptography
composability
Ciphers
cipher modification
arithmetic source compression coding
biblio
Content Adaptive Image Steganalysis in Spatial Domain Using Selected Co-Occurrence Features
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
primary content adaptive stego algorithms
image classification
Image edge detection
image steganalysis
LBP features
local co-occurrence features
local image region
Metrics
microsoft windows
Histograms
privacy
pubcrawl
selected co-occurrence features
Spatial domain
Steganography
steganography detection
weak classifier
boosted classifiers
Haar transforms
generalization power
general content adaptive image steganography detector
final detector
feature selection procedure
Feature Selection
feature extraction
Detectors
Databases
content adaptive image steganalysis
content adaptive
composability
co-occurrence feature
Classification algorithms
candidate features
biblio
An Improved Video Steganography: Using Random Key-Dependent
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
privacy
video signal processing
video recording
video frames RGB channels
steganography performance criteria
steganography detection
Steganography
security
secret text
secret data hiding
Robustness
Random Key -Dependent Data
quality assessment
pubcrawl
composability
nonsecret digital carrier
Metrics
Media
information technology
information insurance
improved video steganography
Image edge detection
image colour analysis
Hiding information and Key-Dependent Data Technique
Exact Matching Algorithm
current communications channels insurance advancements
cover media
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »