Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data visualisation
biblio
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
Parallel vision
power data
data modification
CBFM
cloud-blockchain fusion model
Fabric
image data
malicious eavesdropping
Meter reading
computer vision
parallel visual system
performance evaluations
secure manners
Secure storage
security guarantee
tamper-proof characteristics
data deletion
Substations
Scalability
Cryptography
power aware computing
Data models
pubcrawl
blockchain
privacy
smart power grids
Cloud Computing
Distributed databases
Smart Grid
power engineering computing
Smart Grids
blockchain technology
data visualisation
quality assurance
biblio
MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
pubcrawl
manufacturing
manufacturing processes
Metrics
MTComm
MTComm based virtualization
physical machine need
physical machine operations
Policy Based Governance
production engineering computing
machine tools
resilience
Resiliency
Scalability
Solid modeling
Three-dimensional displays
virtual images
Virtualization
visualization
Digital-Twin
Cloud Computing
collaboration
composability
CPMC
Cyber Manufacturing
cyber-physical manufacturing cloud
cyber-physical systems
data visualisation
application scenarios
digital-twin simulator
Digital-Twins simulate physical world objects
Human behavior
Human Factors
image classification
Internet scale machine tool communication method
Internet-scale Computing Security
machine sensors
biblio
Adversarial Examples Against Image-based Malware Classification Systems
Submitted by grigby1 on Thu, 10/29/2020 - 10:13am
learning (artificial intelligence)
visualization
Robustness
Resiliency
resilience
pubcrawl
privacy
Perturbation methods
Metrics
malware files
malware classification
malware
mal-ware classification techniques
machine learning
adversarial attack
invasive software
image-based malware classification systems
image classification
Human behavior
DL-based classification systems
data visualisation
convolutional neural networks
convolutional neural network malware classifiers
convolutional neural nets
convolution neural network
computer vision
adversarial attacks
biblio
EagleEye: A Novel Visual Anomaly Detection Method
Submitted by aekwall on Mon, 10/12/2020 - 10:44am
Anomaly Visualization
Human Behavior and Cybersecurity
visual anomaly detection method
two-dimensional space
System Call Trace
system call
modified t-SNE
human eyes
EagleEyes efficiency
EagleEye view
dimensionality reduction
dimensional reduction
data depth
Australian Defence Force Academy Linux Dataset
Intrusion Detection
Human behavior
normal behaviors
abnormal behaviors
Two dimensional displays
Three-dimensional displays
data visualisation
principal component analysis
Data visualization
Mathematical model
pubcrawl
Linux
security of data
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 10:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
biblio
Augmented reality for visualizing security data for cybernetic and cyberphysical systems
Submitted by grigby1 on Fri, 08/28/2020 - 11:33am
information security visualization
visualization models
visualization evaluation
visual components
visual analytics
virtual reality
security of data
security data visualization
Scalability
resilience
pubcrawl
privacy
augmented reality
information security areas
information security
Human behavior
Data visualization
data visualisation
data analysis
cyberphysical systems
cybernetics
cybernetic systems
computer security
biblio
Look Inside: Understanding Thermal Flux Through Augmented Reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
perception gap
virtual reality environment
university dropout rate
thermal flux
science technology engineering mathematics field
Scalability
resilience
real-time systems
real-time augmentation
pubcrawl
Prototypes
privacy
Physics computing
Physics
attention split
mixed reality application
learning material
Human behavior
high school
Heating systems
H.5.m [Information Interfaces and Presentation]: Miscellaneous
false-color visualization
engineering education
Data visualization
data visualisation
computer aided instruction
augmented reality environment
augmented reality
biblio
An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion
Submitted by grigby1 on Fri, 08/28/2020 - 11:31am
occlusion
visualization
visual interruptions
virtual information display
Three-dimensional displays
spatial overlays
security requirements
Scalability
resilience
pubcrawl
proximity
privacy
perception
partial occlusion connection lines
3D scenes
maintenance engineering
Information systems
information connection evaluation
industrial augmented reality applications
Human behavior
Engines
encoding
data visualisation
Context
Color
augmented reality
anchors
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
« first
‹ previous
1
2
3
4
5
next ›
last »