Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
biblio
Random Number Generator Based on Hydrogen Gas Sensor for Security Applications
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
petrochemical field
hydrogen gas sensor
II-VI semiconductor materials
microfabrication
microfabrication techniques
nanowires
NIST 800-22 statistical randomness test
nondeterministic noise
nuclear reactors
Hydrogen
random number generation
random number generator
security applications
security of industry applications
thermal noise
thermal noise information
Zinc oxide
sensor security
cryptographic applications
Resiliency
Human behavior
pubcrawl
composability
Metrics
Entropy
Generators
statistical analysis
Cryptography
entropy source
fuel cells
Gas detectors
gas sensor based RNG
gas sensors
hash function SHA-256
high-quality random number generator
biblio
SELF-HEALING AND RESILIENCE IN FUTURE 5G COGNITIVE AUTONOMOUS NETWORKS
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
self-healing functions
gaussian distribution
key requirements
Long Term Evolution
managed network functions
mobile network self-healing
multidimensional statistical methods
radio access networks
resilience
future network deployments
SON
SON self-healing
sophisticated machine learning methods
statistical analysis
telecommunication computing
ultra-high reliability
self-healing networks
automated anomaly detection
machine learning
pubcrawl
composability
optimization
Reliability
Anomaly Detection
self-healing
5G mobile communication
learning (artificial intelligence)
Case-Based Reasoning
cognitive network management
critical machine-type communication
degraded states
diagnosis function
future 5G cognitive autonomous networks
future cognitive autonomous mobile networks
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
biblio
Audio Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:29pm
Scalability
optimization-based audio texture synthesis
optimization-based visual transfer method
optimized loss
pubcrawl
random noise
reference audio style
resilience
Resiliency
optimization
social media
social networking (online)
sound texture model
Spectrogram
statistical analysis
texture synthesis
Two dimensional displays
visualization
feedforward neural nets
audio signal processing
audio style transfer
Auditory system
CNNs
convolution
convolution neural networks
Deep Neural Network
feature extraction
audio content
human auditory system
image style transfer
image texture
Metrics
Neural networks
neural style transfer
optimisation
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »