Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
A Mixed Method For Internal Threat Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
deep learning
feature extraction
Support vector machines
pubcrawl
Conferences
Heuristic algorithms
Data models
privacy
Metrics
automation
Internal Threat
threat vectors
fully connected neural network
mixed detection
support vector data description
Variational Auto-Encoders
biblio
Asymmetric Encryption of Surveillance Videos for Adaptive Threshold based Moving Object Detection
Submitted by grigby1 on Tue, 05/10/2022 - 3:32pm
adaptive thresholding
Conferences
encryption
Human behavior
key generation
Metrics
object detection
pubcrawl
real-time systems
resilience
Resiliency
RSA
Streaming media
Video Segmentation
video surveillance
biblio
An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning
Submitted by aekwall on Tue, 05/10/2022 - 1:50pm
codes
Compositionality
Conferences
deep learning
Human behavior
Logic gates
Manuals
Metrics
neural network
pubcrawl
Recurrent neural networks
Resiliency
software quality
vulnerability detection
biblio
Representation vs. Model: What Matters Most for Source Code Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 1:50pm
Measurement
Neural networks
security
deep learning
Analytical models
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Compositionality
Syntactics
transfer learning
vulnerability detection
software vulnerability detection
biblio
Feature Extraction Method for Cross-Architecture Binary Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
Software
tools
feature extraction
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Compositionality
codes
vulnerability detection
binary vulnerability detection
Consumer electronics
cross-architecture
Intermediate language
similarity evaluation
biblio
Spoofing Detection for Indoor Visible Light Systems with Redundant Orthogonal Encoding
Submitted by aekwall on Tue, 05/10/2022 - 1:45pm
denial of service
Visible Light Communications Security
spoofing detection
orthogonal encoding
multi-link VLC
indoor VLC and VLS
Fixtures
Transmitters
light emitting diodes
sensors
encoding
Resiliency
Metrics
Scalability
pubcrawl
Conferences
Hardware
biblio
Energy-Efficient Friendly Jamming for Physical Layer Security in Visible Light Communication
Submitted by aekwall on Tue, 05/10/2022 - 1:44pm
Conferences
pubcrawl
Scalability
Metrics
Resiliency
physical layer security
light emitting diodes
Interference
Energy Efficiency
Transmitters
Communication channels
precoding
Jamming
VLC
Visible Light Communications Security
biblio
On Secrecy Sum-Rate of Artificial-Noise-Aided Multi-user Visible Light Communication Systems
Submitted by aekwall on Tue, 05/10/2022 - 1:44pm
simulation
Conferences
pubcrawl
Scalability
Metrics
Resiliency
Receivers
physical layer security
light emitting diodes
artificial noise
secrecy rate
Transmitters
Upper bound
visible light communication
Visible Light Communications Security
biblio
Security Aware Indoor Visible Light Communication
Submitted by aekwall on Tue, 05/10/2022 - 1:43pm
security
performance evaluation
Conferences
encryption
pubcrawl
Scalability
Metrics
Resiliency
light emitting diodes
optical transmitters
Error analysis
indoor communication
OOK
optical receivers
visible light communication
Visible Light Communications Security
biblio
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem
Submitted by grigby1 on Tue, 05/10/2022 - 12:55pm
key generation
ubiquitous computing
Scalability
Resiliency
resilience
pubcrawl
paillier cryptosystem
Metrics
mathematical analysis
Big Data
information security
Human Factors
Homomorphic encryption
data privacy
Cryptography
Conferences
cloud computing security
big data security
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »