Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image edge detection
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
MEC network
spoofing detection method
spoofing detection
security problems
security of data
Scalability
Resiliency
pubcrawl
pattern clustering
multiple channel attributes
multiple attributes
mobile edge computing network
Mobile Edge Computing
mobile computing
Cloud Computing
Intrusion Detection
internet
Information Centric Networks
Information Centric Network
Image edge detection
ICN
Heuristic algorithms
edge computing
distributed network architecture
Clustering algorithms
clustering algorithm
cluster algorithm
cloud platform
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
Submitted by grigby1 on Wed, 05/01/2019 - 11:34am
Metrics
verifying security policies
security policies
security of data
security
Scalability
Resiliency
resilience
Redundancy
pubcrawl
potential security breaches
Policy Validation and Correction.
pattern clustering
obtained clusters
nonallowed accesses
ABAC Policy
Image edge detection
edge detection
Conferences
composability
clustering technique
clustering
big data environments
Big Data
Anomaly Detection and Resolution
Anomaly Detection
access log based approach
Access Log
Access Control
biblio
EDMAND: Edge-Based Multi-Level Anomaly Detection for SCADA Networks
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
network traffic data
telecommunication traffic
supervisory control and data acquisition systems
security of data
security
Scalability
SCADA systems
SCADA network traffic
Resiliency
resilience
pubcrawl
Protocols
network-based intrusion detection
Anomaly Detection
Monitoring
Metrics
malicious attacks
large-scale distributed industrial systems
Image edge detection
event detection
EDMAND
edge-based multilevel anomaly detection
edge detection
Detectors
composability
appropriate anomaly detection methods
biblio
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
learning (artificial intelligence)
Training data
security threats
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
machine learning algorithms
machine learning
Batch-EPD Boundary Pattern detection algorithm
Intrusion Detection Systems
Intrusion Detection
Image edge detection
edge pattern points
Edge Pattern Detection algorithm
edge detection
detection algorithms
Data models
composability
chronic poisoning attack
big data era
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Image Processing
Wires
Sobel operator
Sobel edge detector
signal processing in the encrypted domain
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Metrics
image segmentation scheme
image segmentation
adaptive threshold decision algorithm
image filtering
Image edge detection
image distribution
Homomorphic encryption
Gaussian filtering
garbled circuit
encryption
encrypted image edge detection
edge detection
data privacy
Cryptography
composability
Cloud Computing
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »