Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
Detecting SSH and FTP Brute Force Attacks in Big Data
Submitted by grigby1 on Tue, 06/14/2022 - 1:11pm
Cyber-security
Brute-force Attack
big data security metrics
statistical analysis
CSE-CIC-IDS2018
Decision Tree
Intrusion Detection
Force
Classification algorithms
feature extraction
Big Data
telecommunication traffic
Data models
Scalability
Resiliency
resilience
pubcrawl
biblio
Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
Metrics
Somewhat Homomorphic Encryption
Human Factors
fully homomorphic encryption
Home appliances
Homomorphic encryption
statistical analysis
smartphone
public key cryptography
pubcrawl
Portable computers
Computers
Scalability
IoT device
performance evaluation
Conferences
Resiliency
resilience
biblio
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
Submitted by grigby1 on Mon, 06/06/2022 - 12:08pm
security
Monitoring
pubcrawl
Resiliency
Correlation
Libraries
Compositionality
software quality
Open Source Software
statistical analysis
code reuse
Library dependency
Software Vulnerability
Information Reuse
biblio
Psychophysiological Effect of Immersive Spatial Audio Experience Enhanced Using Sound Field Synthesis
Submitted by grigby1 on Mon, 05/23/2022 - 3:59pm
Acoustics
wave power
psychophysiological effect
perception of spatial sound
Immersive audio experience
Heart
Autonomic nervous system
music
statistical analysis
pubcrawl
immersive systems
Time series analysis
composability
privacy
Resiliency
Human Factors
Human behavior
biblio
Statistical Analysis of Pseudorandom Sequences and Stegocontainers
Submitted by grigby1 on Fri, 05/20/2022 - 4:33pm
pubcrawl
Generators
Cryptography
web services
NIST
composability
Compositionality
manufacturing
statistical analysis
Industrial engineering
pseudorandom sequences
TestU01
theoretical cryptography
biblio
User Behaviour based Insider Threat Detection in Critical Infrastructures
Submitted by grigby1 on Thu, 05/19/2022 - 12:54pm
privacy
User Behavior Analysis
Insider Threat Detection (ITD)
Bi-directional Long Short Term Memory (bi-LSTM)
threat vectors
statistical analysis
support vector machine (SVM)
Metrics
Computer crime
critical infrastructure
pubcrawl
Anomaly Detection
machine learning
cyber security
Support vector machines
Organizations
feature extraction
deep learning
biblio
A Secure Communication Protocol between Sensor Nodes and Sink Node in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Fri, 05/06/2022 - 4:33pm
wireless sensor networks
marine data collection
Underwater Networks
underwater acoustic sensor networks
statistical analysis
Scalability
confidentiality
Metrics
Wireless communication
encryption
Protocols
authentication
data integrity
Resiliency
resilience
pubcrawl
security
Data collection
biblio
Image encryption algorithm using DNA pseudo-symbols and chaotic map
Submitted by grigby1 on Fri, 05/06/2022 - 10:34am
human computer interaction
DNA symbols sequence
DNA pseudo-symbols
chaos game representation of the symbols
chaotic map
DNA cryptography
image encryption
Robot kinematics
DNA
statistical analysis
pubcrawl
resilience
chaos
Metrics
Games
encoding
privacy
Resiliency
Human behavior
biblio
HARS: Heuristic-Enhanced Adaptive Randomized Scheduling for Concurrency Testing
Submitted by grigby1 on Tue, 05/03/2022 - 3:57pm
Heuristic algorithms
statistical analysis
Security Heuristics
Search methods
Schedules
Scalability
Resiliency
resilience
pubcrawl
predictability
Concurrency
Concurrent computing
concurrency bugs
concurrency bug pattern
Computer bugs
bug detection
adaptive scheduling
adaptive random testing
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »