Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network
Submitted by aekwall on Mon, 03/04/2019 - 9:45am
internet
attribution
space-ground integration information network
pattern matching
network attacks
cyber security knowledge graph
cyber attack attribution
Correlation
computer security
tools
security of data
Metrics
graph theory
composability
pubcrawl
Human behavior
cyber-attack
Ontologies
human-in-the-loop security center paradigm
biblio
A New Payload Partition Strategy in Color Image Steganography
Submitted by grigby1 on Fri, 02/22/2019 - 3:08pm
Color
composability
Correlation
distortion
Gray-scale
Image color analysis
Image Steganography
Metrics
modification probabilities
payload partition
Payloads
privacy
pubcrawl
RGB channels
security
steganography detection
biblio
Method of Textual Information Authorship Analysis Based on Stylometry
Submitted by grigby1 on Fri, 02/22/2019 - 3:02pm
natural language processing
Ukrainian scientific texts
textual information authorship analysis
text content monitoring
text analysis
stylometry technologies usage
stylometry
stop words
statistical linguistic analysis
reference text fragment
Radio frequency
pubcrawl
Porter stemming algorithm (Porter stemmer)
Porter stemmer
NLP methods
author publications
Monitoring
Metrics
linguometry
Linguistics
linguistic analysis
information retrieval
Indexes
Human behavior
glottochronology
formal approach
Dictionaries
Correlation
Content analysis
computational linguistics
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme
biblio
Fingerprinting Method for Acoustic Localization Using Low-Profile Microphone Arrays
Submitted by grigby1 on Mon, 01/21/2019 - 11:27am
Probability density function
indoor localization
low-profile microphone arrays
mean localization errors
mean square error methods
MEMS microphone arrays
microphone array
microphone arrays
microphones
PHAse Transform
Human behavior
pubcrawl
research phase
Resiliency
Root Mean Square Errors
sound events
unknown acoustic events
White noise
Wireless Acoustic Sensor Networks
wireless sensor networks
anechoic room
Acoustic Fingerprinting
Acoustic Fingerprints
Acoustic localization
acoustic measurement
Acoustic measurements
acoustic sensor nodes
Acoustic signal processing
acoustic transducers
Acoustics
acoustic event localization
Angle of Arriva fingerprinting method
AoA fingerprinting algorithm
composability
computationally efficient time domain delay-based AoA algorithms
Correlation
direction-of-arrival estimation
dot product calculations
female vocal sounds
frequency-domain analysis
biblio
Power Mobile Terminal Security Assessment Based on Weights Self-Learning
Submitted by grigby1 on Wed, 11/14/2018 - 12:22pm
power system security
weights self-learning method
Training
Software
security of data
security assessment system
security assessment
security
Scalability
Resiliency
resilience
rank correlation analysis
pubcrawl
Correlation
power mobile terminal system
power mobile terminal security assessment
power mobile terminal
power engineering computing
mobile computing
machine learning
learning (artificial intelligence)
Indexes
Human behavior
Hardware
fuzzy comprehensive analysis
expert systems
biblio
Empirical study of the impact of e-government services on cybersecurity development
Submitted by grigby1 on Fri, 09/28/2018 - 3:04pm
Electronic government
security of data
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
Online service index
Indexes
Human behavior
government data processing
global cybersecurity development index
2015 International Telecommunication Union
e-government services
e-government development index
E-government development
E-Government
Cybersecurity development
Cybersecurity
cyber-security policy
Correlation
computer security
Communications technology
biblio
A noise parameter configuration technique to mitigate detour inference attack on differential privacy
Submitted by grigby1 on Fri, 09/28/2018 - 10:58am
inference attack
Scalability
Resiliency
pubcrawl
Probability distribution
privacy protection
privacy preserving technique
privacy
noise parameter configuration method
Mathematical model
linear regression
attribute correlation
Human behavior
differential privacy method
differential privacy
detour inference attack mitigation
Databases
data utility
Data protection
data privacy
Correlation
composability
biblio
Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 10:58am
original graph
uncertain graphs
uncertain graph
uncertain form
social-network data publishing
social-network data
social networking (online)
Social network services
Sensitivity
Scalability
Resiliency
pubcrawl
probability
privacy preserving
privacy
Perturbation methods
adversary knowledge
obfuscation algorithm
Human behavior
graph theory
general model
friendly-correlation preservation
differential privacy
data utility
data privacy
Correlation
composability
background knowledge attack
associated probability
algorithm privacy
Algorithm design and analysis
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »