Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
Submitted by BrandonB on Mon, 05/04/2015 - 1:19pm
Image quality
Videos
source attribution techniques
source attribution
seam-carving-based anonymization
seam-carving method
seam-carving
PRNU noise pattern-based source attribution
PRNU noise pattern
photoresponse nonuniformity
Noise
anonymization
image denoising
Image coding
image anonymization
deanonymization attacks
de-anonymization attacks
counter-forensics
Correlation
content-aware resizing method
Cameras
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead
biblio
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:57pm
Media Access Protocol
WSN topology
wireless sensor networks
Wireless Sensor Network
traffic analysis technique
telecommunication traffic
telecommunication security
standards
sensors
network traffic flow
acknowledged communication
Measurement
location privacy
enhanced evidence theory metric
Correlation
base station anonymity
anonymity
acknowledgement based wireless sensor networks
acknowledgement aware evidence theory
biblio
A Novel Acoustic Fingerprint Method for Audio Signal Pattern Detection
Submitted by BrandonB on Mon, 05/04/2015 - 10:32am
finite state machine
Time-Frequency processing
Time-frequency Analysis
time-domain analysis
speech recognition techniques
Spectral signature
Pitch frequency
Pattern recognition
Noise measurement
mechanical sounds
hybrid time-frequency approach
FSM model
frequency-domain analysis
finite state machines
Finite State Machine(FSM)
Acoustic Fingerprint
efficient audio signal recognition algorithm
Correlation
computational complexity
background noises
audio signal processing
audio signal pattern detection
Audio recognition
Audio detection
Acoustics
Acoustic signal processing
acoustic signal detection
acoustic noise
acoustic fingerprint method
biblio
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
localized periodicity analysis
wavelet multiresolution analysis method
wavelet analysis
traffic anomaly
Time-frequency Analysis
RoQ attack
reduction of quality
network traffic
network security
Multiresolution analysis
misuse detection
Algorithm design and analysis
inhibit normal TCP flows
detection systems
detection algorithms
detection algorithm
denial of service attack
Correlation
computer network security
Computer crime
autocorrelation analysis
Anomaly Detection
biblio
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion
Submitted by BrandonB on Fri, 05/01/2015 - 7:15am
frequency estimation
window size
timestamp identification
Time-frequency Analysis
STFT
signal-to-noise ratio
Signal to noise ratio
Signal resolution
short-time Fourier transform
short recording durations
reference data
MMSE
minimum mean squared error
mean square error methods
maximum correlation coefficient
frequency resolution problems
audio authentication
frequency estimates
Fourier transforms
extracted ENF signal
estimation
ENF criterion
electric network frequency criterion
Electric network frequency (ENF)
dynamic matching
correlation methods
Correlation
autocorrection process
audio timestamp identification
audio recording
audio forensics
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 12:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Thu, 04/30/2015 - 12:21pm
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
« first
‹ previous
…
14
15
16
17
18
19
20
21
22