Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Evaluation of metrics of susceptibility to cascading blackouts
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
Computing Theory
Western interconnection
susceptibility metric evaluation
power system redundancy
Power system protection
Power system operation
power system interconnection
power system faults
LODF matrix
line outage distribution factor matrix
DFAX matrix
cascading blackouts
blackouts
Redundancy
Security Metrics
Stress
power system reliability
power system planning
Springs
Metrics
network theory (graphs)
Correlation
Monitoring
matrix algebra
power system security
Measurement
pubcrawl
biblio
Toward the SIEM architecture for cloud-based security services
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
intelligent cyber-threat
virtualization technologies
virtualisation
Software Architecture
SIEM architecture
SIEM
security-as-a-service
security of data
security information and event management
SECaaS platform
SECaaS
pubcrawl
Cloud Computing
information security
Engines
Data models
Data mining
Cryptography
Correlation
computational intelligence
Compositionality
composability
cloud-based security service
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
biblio
Anticipatory Driven Nodal Electricity Load Morphing in Smart Cities Enhancing Consumption Privacy
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
personal habits
Theil coefficients
smart power grids
Smart Grids
smart grid consumer privacy
Smart Grid
smart cities
Servers
pubcrawl
privacy
predictive tools
power system security
power profiles
power infrastructure
power consumption
aggregated pattern
optimization scheme
optimization
load morphing
load anticipation
Human Factors
genetic algorithms
genetic algorithm
electricity consumption patterns privacy
digital connectivity
data privacy
Correlation
consumption privacy
anticipation
biblio
Bandwidth Prediction on a WiMAX Network
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
Mobile communication
wireless
WiMAX network
WiMax
RSSI
receive signal strength indicator
prediction
next-generation networking technology
next generation networks
Bandwidth
IEEE 802.16 standard
IEEE 802.11 Standards
high-speed network access
Educational institutions
Correlation
CINR
carrier to interference plus noise ratio
bandwidth prediction
1536086
biblio
Scalable Role-Based Data Disclosure Control for the Internet of Things
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
medical computing
Watermarking
smart health care
security
scalable role-based data disclosure control
Scalability
RFIDs
RFID
Resiliency
resilience
radio frequency identification
pubcrawl
privacy
Access Control
IoT data filtering
IoT data aggregation
Internet of Things
human factor
Human behavior
health care
Disclosure control
digital watermarking technique
data privacy
Correlation
Contextualization
Big Data
biblio
Parameter selection for swarm intelligence algorithms \#x2014; Case study on parallel implementation of FSS
Submitted by K_Hooper on Wed, 05/02/2018 - 10:37am
number-of-iterations
swarm intelligence algorithms
Swarm Intelligence
Sociology
Silicon
SI algorithms
search problems
pubcrawl
problem complexity
population size
parameter selection
parallel implementation
optimisation
complex optimization problems
Iterative methods
FSs
Frequency selective surfaces
Fish School Search
Fish
execution time
Correlation
computational intelligence
computational complexity
composability
Complexity theory
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
biblio
Research on K Anonymity Algorithm Based on Association Analysis of Data Utility
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
K anonymity
Resiliency
resilience
Publishing
pubcrawl
Privacy preserve
principal component analysis
personal privacy information
personal identity
PCA-GRA K anonymous algorithm
optimization
Metrics
medical information systems
medical data privacy
K anonymity algorithm
Algorithm design and analysis
information loss
Human behavior
grey systems
Grey relational analysis K anonymous algorithm
feature maintenance
data utility
data privacy
data analysis
correlation coefficient
Correlation
composability
classification evaluation performance
association analysis
anonymity
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »