Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
set theory
biblio
Definition of Protective Measures of Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 08/26/2022 - 10:08am
Data protection
protection measure
Euler-Venn diagram
basic set
automated process control system
Area measurement
Graphics
information protection system
Industrial engineering
information security
Computing Theory
set theory
Metrics
Buildings
process control
pubcrawl
security
biblio
Homomorphic Properties Within Lattice-Based Encryption Systems
Submitted by grigby1 on Thu, 06/09/2022 - 1:42pm
Cryptography
encryption
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
information security
Metrics
Homomorphic encryption
cryptocurrency
Lattices
set theory
Memory
embedded computing
Human Factors
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Grassmannian Frames in Composite Dimensions by Exponentiating Quadratic Forms
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
Grassmannian frames
unique primes
second-order Reed-Muller Grassmannian frames
quadratic forms
prime decomposition
power-of-two dimension D
orthogonal bases
nonprime-power dimension
mutually unbiased bases
mask sequence
Ker- dock codes
Hadamard matrices
Scalability
generalized Hadamard matrix
explicit sets
element-wise product
different quadratic forms
Delsarte-Goethals codes
Reed-Muller codes
set theory
exponentiation
pubcrawl
Resiliency
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 1:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
biblio
Symmetries and privacy in control over the cloud: uncertainty sets and side knowledge*
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
cloud
Control Theory and Privacy
uncertainty sets
transformation-based method
side knowledge
control algorithms
Cost function
Transforms
cyber physical systems
set theory
Trajectory
Cloud Computing
privacy protection
control engineering computing
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Scalability
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
A Template Matching Background Filtering Method for Millimeter Wave Human Security Image
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
bilateral filtering
adaptive filtering
traditional filtering method
template matching background filtering method
template matching
objects identification
Object recognition
millimetre wave imaging
millimeter wave security image
millimeter wave human security inspection
millimeter wave human security image
Level Set Segmentation
level set algorithm
image details
human body area
Scalability
background noise
background area
adaptive template
actual millimeter wave image
matched filters
set theory
image matching
image denoising
image segmentation
filtering theory
Metrics
pubcrawl
Resiliency
1
2
3
next ›
last »