Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
educational administrative data processing
brute force attacks
uncracked passwords
Slovenian university
password security
password creation policies
password cracking
online grading system
hybrid attacks
hashed real-world passwords
hashed passwords
Educational institutions
authorisation
Dictionaries
cracked passwords
Brute-force Attack
dictionary attack
information system
policy-based governance
Human Factors
password
Force
collaboration
pubcrawl
biblio
Adversarial Video Captioning
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
targeted attacks
adversarial video captioning
cosine similarity
deep learning models
image captioning attack
image captioning attacks
image domain
Streaming media
target captions
targeted
adversarial machine learning techniques
video captioning
video captioning model
video captioning task
video domain
video playback quality
video stream
video streaming
deep video
machine learning
Scalability
computer architecture
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Force
learning (artificial intelligence)
security of data
deep learning
optimization
computer vision
Perturbation methods
video signal processing
adversarial
adversarial attack
Adversarial Machine Learning
biblio
Unit Regression Test Selection According To Different Hashing Algorithms
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Layout
hash algorithms
unit regression test selection
Testing process
regression test selection
in-depth review
hashing algorithms
hashing
resource usage
Manuals
security
Compositionality
regression analysis
testing
program testing
Force
Synchronization
pubcrawl
Resiliency
Software
biblio
Electromagnetic Design and Dynamic Characteristics of Permanent Magnet Linear Oscillating Machines Considering Instantaneous Inductance According to Mover Position
Submitted by grigby1 on Fri, 04/24/2020 - 4:09pm
Mechanical systems
Stator cores
Resiliency
resilience
pubcrawl
privacy
permanent magnet motors
oscillating behaviors
Metrics
composability
Magnetic forces
IPM linear machine
instantaneous inductance
Inductance
Force
Electromagnetics
Dynamic characteristic
biblio
Performance Analysis of Floating Buoy Point Absorber and Oscillating Surge Wave Energy Converters in Onshore and Offshore Locations
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
Resiliency
oscillating surge wave energy converters
Performance analysis
power generation
privacy
pubcrawl
renewable energy
Renewable Energy Resources
renewable energy sources
resilience
oscillating behaviors
Solid modeling
Surges
Variability
wave energy converter
wave period
wave power
wave power generation
wave power plants
WEC devices
Mathematical model
Bay of Bengal
clean energy targets
composability
Computational modeling
FBPA WEC
floating buoy point absorber
Force
greenhouse gas emission reduction
irregular wave conditions
Bangladesh
Metrics
ocean waves
offshore
offshore location
offshore wave height
onshore
onshore location
onshore wave height
OS WEC
biblio
Multi-work Condition Modeling and Performance Analysis of Linear Oscillating Actuators
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
pubcrawl
Mathematical model
Metrics
multi-work condition
multiwork condition modeling
nonresonance frequencies
oscillating behaviors
Performance analysis
privacy
Load modeling
resilience
Resiliency
Resonant frequency
resonant principle
spring oscillator
springs (mechanical)
Windings
electrical motors
actuator health status
actuators
Coils
composability
constant impedance angle method
direct-drive electromechanical systems
electric actuators
electric motors
actuator behavior
electromechanical actuators
electromechanical model
finite element analysis
Force
linear motors
linear oscillating actuator
linear oscillating actuators
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
Proactive Secure Coding for iOS Applications
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
operating systems (computers)
tools
Syntactics
static code analysis
static analysis
security of data
security
secure coding issues
secure APIs
Resiliency
resilience
proactive secure coding
iOS Security
iOS developers
iOS applications
ios
Human behavior
Force
encoding
Computer languages
composability
applications
application program interfaces
pubcrawl
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »