Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
A Remote Data Integrity Checking Scheme for Big Data Storage
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
fine-grained update
Servers
Scalability
remote data integrity checking scheme
remote data integrity checking
pubcrawl
privacy
Memory
mapping relationship
Indexes
Balanced update tree
dynamic update
data structures
data privacy
Data models
data integrity
data deletion
data block
big data storage
Big Data
biblio
Realistic measurement protection schemes against false data injection attacks on state estimators
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
maximum total ROI
FDIA
power system state estimation
Computing Theory
alternative measurement protection schemes
cost-benefit analysis
false data injection attacks
ignored cost-benefit issue
imminent cyber-physical security issue
state estimation
metric return
realistic measurement protection schemes
realistic MPS
return on investment
state estimators
Steiner tree problem
Steiner trees
Security Metrics
Metrics
Indexes
optimization
optimisation
power engineering computing
Smart Grids
power system security
trees (mathematics)
security of data
cyber-physical security
risk management
performance evaluation
pubcrawl
false data injection attack
graph theory
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
biblio
A K-nearest neighbor locally search regression algorithm for short-term traffic flow forecasting
Submitted by grigby1 on Mon, 06/11/2018 - 3:44pm
nearest neighbour methods
traffic flow vector
traffic flow data
traffic control
Silicon
short-term traffic flow forecasting
search problems
root mean squared error
road traffic
regression analysis
Real-Time Traffic Control
real-time systems
pubcrawl
Predictive models
Prediction algorithms
optimal nearest neighbors
Baoanbei intersection
nearest neighbor search
Metrics
Measurement
mean square error methods
locally search strategy
local similarity
k-NN model
k-nearest neighbor locally weighted regression algorithm
K-nearest neighbor locally search regression algorithm
k-nearest neighbor
k-LSR algorithm
Indexes
forecasting theory
forecasting
data-driven method
biblio
Double-bit quantization and weighting for nearest neighbor search
Submitted by grigby1 on Mon, 06/11/2018 - 3:42pm
Metrics
weighted hamming distance
search problems
real-value signature conversion
Quantization (signal)
quantisation (signal)
pubcrawl
NN search
nearest neighbor search
binary code
Measurement
Indexes
double-bit quantization and weighting
Double-bit quantization
DBQW
binary embedding method
binary embedding
Binary codes
biblio
Visible Nearest Neighbor Search for Objects Moving on Consecutive Trajectories
Submitted by grigby1 on Mon, 06/11/2018 - 3:42pm
Heuristic algorithms
Indexes
Measurement
Metrics
Monitoring
Moving objects
Multi-layer neural network
nearest neighbor search
Nickel
pubcrawl
Trajectory
visibility
biblio
The price of anarchy in transportation networks by estimating user cost functions from actual traffic data
Submitted by el_wehby on Tue, 05/15/2018 - 7:41pm
Cost function
Indexes
optimization
price of anarchy
Roads
smart cities
System performance
Transportation Networks
variational inequalities
vehicles
1645681
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
internet
Servers
security risks
scalar product preserving encryption
Resiliency
resilience
query answering
pubcrawl
product preservation property
outsourcing
Metrics
Mathematical model
ASPE
Indexes
Human behavior
encryption
Cryptography
confidential information
Compositionality
Cloud Computing
ciphertexts
asymmetric scalar-product-preserving encryption
Asymmetric Encryption
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »