Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Source Device Attribution of Thermal Images Captured with Handheld IR Cameras
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
low-cost handheld thermal camera
thermal imaging devices
Temperature measurement
source device attribution method
source camera
Radiometry
radiometric data
pubcrawl
pocket-size thermal cameras
noise reduction
Metrics
attribution
infrared imaging
Human behavior
handheld IR cameras
Fingerprint recognition
digital images
digital forensics literature
Correlation
composability
Cameras
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 9:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
DNA and Chaos Based Confusion-Diffusion for Color Image Security
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image encryption
multimedia files
image pixels
DNA XOR rules
DNA decoding
DNA coding
Diffusion
deoxyribo nucleic acid coding
confusion-diffusion process
Confusion
confused image
column shuffling
colour image encryption
color image security
chaos aided inter-planar row
DNA cryptography
Cryptography
Histograms
chaos
image colour analysis
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
5D Combined Chaotic System for Image Encryption with DNA Encoding and Scrambling
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
DNA cryptography
UACI
tent map
sine map
pixel scrambling
NPCR
logistics map
Henon map
entropy values
DNA scrambling
DNA complementary function
bit scrambling
5D combined chaotic system
5D Chaotic system
DNA encryption
DNA encoding
Cryptography
image sequences
chaotic sequences
image encryption
Histograms
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
DURS: A Distributed Method for k-Nearest Neighbor Search on Uncertain Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 1:22pm
distributed system
nearest neighbor search
uncertain graphs
social networking (online)
scalable search
Scalability
Market research
k-nearest neighbor search
k-nearest neighbor queries
k-nearest neighbor
DURS
pubcrawl
biology
query processing
graph theory
probability
nearest neighbour methods
Measurement
Metrics
computer science
Indexes
Correlation
biblio
A Survey of Time-varying Structural Modeling to Accountable Cloud Services
Submitted by grigby1 on Fri, 05/22/2020 - 1:17pm
Metrics
uncertainty correlation
uncertainty
time-varying structure modeling methods
time-varying structural modeling
time varying structure
Software
Resiliency
resilience
pubcrawl
network accountability
modeling
accountable cloud services
Correlation
computing characteristics
Computational modeling
composability
cloud services
cloud service structure modeling
cloud service network architecture
cloud service accountability
Cloud Computing
Analytical models
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »