Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image color analysis
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 12:36pm
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 1:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk
biblio
"Secured data communication system using RSA with mersenne primes and Steganography"
Submitted by grigby1 on Tue, 02/14/2017 - 12:59pm
image file
Steganography
secured data communication system
RSA cipher
public key cryptography
Public key
pubcrawl170102
Prime RSA
Mersenne primes
Mersenne
arrays
Image color analysis
Image coding
hidden text
factorization
encryption
data communication
Cryptography
communication channel
Ciphers
biblio
Entropy constrained exemplar-based image inpainting
Submitted by BrandonB on Tue, 05/05/2015 - 1:28pm
edge detection
Entropy
entropy constrained exemplar-based image inpainting
Equations
false edge propagation
Image color analysis
Image edge detection
Image reconstruction
image restoration
old painting restoration
photograph restoration
PSNR
structural similarity index
biblio
Object retrieval using scene normalized human model for video surveillance system
Submitted by BrandonB on Fri, 05/01/2015 - 9:37am
Cameras
Databases
feature extraction
human model
Image color analysis
image retrieval
multiple ellipse human model
object retrieval
object tracking
retrieval system
scene calibration
scene normalized human model
Shape
surveillance system
video surveillance
video surveillance retrieval system
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
« first
‹ previous
1
2
3
4
5
6
7