Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
biblio
Comparing the Performance of Adaptive Boosted Classifiers in Anomaly based Intrusion Detection System for Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
intrusion detection Kaggle dataset
Training
tools
Resiliency
Random Tree
pubcrawl
pattern classification
network intrusion detection
network based intrusion detection
naïve Bayes classifier
Metrics
lengthy detection process
learning (artificial intelligence)
Intrusion Detection Systems
intrusion detection system
adaptive boosted classifiers
Intrusion Detection
hybrid anomaly based intrusion detection system
discretization
detection rate
Decision trees
Data mining
Correlation based feature weighted Naïve Bayes
Correlation
computer network security
composability
boosting techniques
boosting process
boosting
biblio
Efficient Video Encryption Using Lightweight Cryptography Algorithm
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
Resiliency
lightweight cryptography algorithm
lightweight encryption methods
low computation cost
low powered battery operated devices
natural redundancy
neighbouring pixels
pubcrawl
resilience
KHAZAD cipher
Secure Force (SF)
secure IoT
Secure IoT (SIT)
small battery operated devices
spatio-temporal correlation
Spatiotemporal phenomena
video data
video signal processing
efficient encryption
Ciphers
composability
conventional encryption methods
Correlation
correlation methods
Cryptography
Cyber Physical System
cyber physical systems
Cipher
efficient video encryption
encryption
encryption algorithm
Entropy
highly complex encryption process
Histograms
Internet of Things
IoT environment
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
correlation-preserving coding scheme
two-way lossy transmission
two-way channels
source-channel system
rate-one separate source-channel coding
Propagation losses
Network information theory
lossy transmission
joint source-channel coding scheme
joint source-channel coding
hybrid digital-analog coding
hybrid coding
genie-aided argument
DM-TWC
discrete-memoryless two-way channels
Resiliency
channel noise
adaptive coding
adaptive codes
combined source-channel coding
channel coding
distortion
Indexes
channel capacity
Correlation
Decoding
Metrics
composability
pubcrawl
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »