Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clustering algorithms
biblio
Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
image classification
visualization
visual saliency
video surveillance
video sequences
Support vector machines
Scalability
saliency prediction model
Resiliency
pubcrawl
Prediction algorithms
positively detected windows
object detection
k-means algorith
Clustering algorithms
human tracking
human resources
human detection
human being detection
Human behavior
HOG feature vectors
histograms of oriented gradients
feature extraction
deep multilevel network
computer vision algorithms
computer vision
Computational modeling
cognitive science approach
biblio
Dynamic clustering for event detection and anomaly identification in video surveillance
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
Normal Plane
video surveillance event
video surveillance
video signal processing
Trajectory
Time variant events
spectral clustering
Scalability
Roads
Resiliency
pubcrawl
Pattern recognition
object detection
Anomaly Identification
life video surveillance
learning (artificial intelligence)
human behavioral patterns
Human behavior
Heuristic algorithms
feature extraction
event detection
dynamic clustering
Clustering algorithms
Anomaly Plane
anomaly identification results
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Acceleration of RSA processes based on hybrid ARM-FPGA cluster
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
resilience
MPI
Multicore Computing
multicore computing security
multicore desktop
multiprocessing systems
node-to-node communication
none-subtraction Montgomery algorithm
Program processors
pubcrawl
public key cryptography
microprocessor chips
Resiliency
RSA
RSA algorithm
RSA processes acceleration
Scalability
software-hardware cooperation
system-on-chip
Xilinx Zynq SoC
Zynq
FPGA fabric
Algorithm design and analysis
ARM CPU
Chinese remainder theorem
cluster
cluster infrastructure
Clustering algorithms
computer architecture
CRT
field programmable gate arrays
Acceleration
Hardware
Heterogeneous
hybrid architectures
hybrid ARM-FPGA cluster
Intel i7-3770
many-core server
message passing
message passing interface
Metrics
biblio
Ranking Causal Anomalies by Modeling Local Propagations on Networked Systems
Submitted by grigby1 on Thu, 02/15/2018 - 11:47am
matrix factorization
Time series analysis
system failure status
single fault propagation
security of data
Resiliency
resilience
pubcrawl
Probabilistic logic
probabilistic clustering
pattern clustering
networked systems
multiple fault diagnosis
Monitoring
Metrics
causal anomaly detection
low-rank network diffusion model
large-scale complex systems
invariant network
Indexes
Human Factors
human factor
Human behavior
global fault propagation
fault diagnosis
debugging
complex systems
complex system behaviors
Clustering algorithms
biblio
Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
surveillance result propagation
Aircraft
wireless communication interface
Unmanned Aerial Vehicles
UAV swarm
UAV network connectivity
temporarily invisible targets
target tracking optimization
target tracking
target detection
ant colony optimisation
surveillance mission
surveillance
stable overlay network
Resiliency
repulsive pheromones
object detection
reconnaissance mission
pubcrawl
pattern clustering
data sharing
Network reconnaissance
multihop clustering
multi-robot systems
map coverage performance
dual-pheromone clustering hybrid approach
dual-pheromone ant-colony model
DPCHA
disappearing target model
autonomous aircraft
autonomous aerial vehicles
coverage fairness
connection volatility
communication range
collaborative swarm
Clustering algorithms
cluster stability
Base stations
attractive pheromones
Atmospheric modeling
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »