Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis
Submitted by grigby1 on Mon, 02/08/2021 - 1:02pm
grey correlation analysis
security
Scalability
Resiliency
resilience
pubcrawl
pixel detection
people vision
Metrics
Mathematical model
Image resolution
Image edge detection
grey systems
grey image edge detection
adaptive algorithm
edge pixel
edge map
edge detection
differential equations
Detectors
Correlation
composability
automatic threshold
area pixels
Analytical models
Algorithm design and analysis
adaptive threshold
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 12:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
A New Four-Dimensional Chaotic System and Its Application in Speech Encryption
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
chaotic communication
chaotic cryptography
Correlation
Cryptography
encryption
four-dimensional chaotic system
key space
low-dimensional chaotic encryption
Metrics
Physics
pubcrawl
Resiliency
Scalability
speech encryption
speech processing
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »