Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
Perceptual blur detection and assessment in the DCT domain
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
just noticeable blur concept
Support vector machines
subjective scores
statistical modelling
statistical features
statistical analysis
quality score
pubcrawl170111
perceptual blur detection
perceptual blur degradation
perceptual blur assessment
Measurement
machine learning system
learning (artificial intelligence)
BBQM metric
JNB concept
image restoration
Image resolution
Image edge detection
feature extraction
discrete cosine transforms
discrete cosine transform
DCT domain
Databases
Correlation
Blurring
blind quality metric
blind blur quality metric
biblio
Symplectic integration for optimal ergodic control
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
nonlinear dynamics
trajectory optimization
trajectory control
time-averaged trajectory
symplectic integration
statistical representation
statistical analysis
standard first-order discretization techniques
spatial distribution
search algorithm
pubcrawl170110
Path Planning
optimal search trajectory
optimal ergodic control
optimal control
autonomous active exploration
nonlinear control systems
mobile robots
Measurement
Linear programming
iterative optimal control algorithm
Iterative methods
Heuristic algorithms
graphical models
Distribution functions
discrete-time iterative trajectory optimization approach
discrete time systems
continuous-time trajectory optimization algorithm
continuous time systems
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 11:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
profile
Yazdan Movahedi
Energy
Systems Engineering
Modeling
Health Care
Manufacturing
Science of Security
Simulation
Validation and Verification
Cybersecurity
Reliability Eng
statistical analysis
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »