Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Iterative methods
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 12:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk
biblio
Implementation of randomize-then-combine constructed hash function
Submitted by BrandonB on Wed, 05/06/2015 - 10:58am
Message systems
Vectors
Resistance
randomize-then-combine technique
randomize-then-combine
Random access memory
programming
parallel multithreaded programming
pair block chaining
multi-threading
block-by-block message processing
Merkle-Damgard construction
Iterative methods
iterative hash function
incremental hash function
Hash function implementation
hash function construction
Educational institutions
Cryptography
biblio
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
Submitted by BrandonB on Wed, 05/06/2015 - 8:14am
photon-counting imaging
Optical polarization
Optical security and encryption
optical security method
optically phase encoded QR code
phase coding
photon counting
photon counting imaging
photon-counting encryption
optical masks
photon-counting security tagging
Photonics
robust read out
smart phones
speckle
speckle signature
statistical analysis
image encryption
coherent imaging
commercial Smartphone
Cryptography
decryption
full phase double-random-phase encryption
Huffman codes
Image coding
image compressing
Adaptive optics
iterative Huffman coding
Iterative methods
masks
Nonlinear optics
object authentication
Optical filters
Optical imaging
biblio
Multiple-Human Tracking by Iterative Data Association and Detection Update
Submitted by BrandonB on Fri, 05/01/2015 - 8:40am
Iterative methods
video surveillance
Trajectory
tracklet association
tracking
temporal information extraction
Solid modeling
sensor fusion
Reliability
object tracking
multiple-human tracking
Accuracy
iterative data association
Intelligent Transportation Systems
human detection results
feature extraction
detection update
detection responses
Data mining
Data association
Computational modeling
automated video surveillance
biblio
Provenance-aware security risk analysis for hosts and network flows
Submitted by BrandonB on Fri, 05/01/2015 - 7:29am
Computational modeling
computer network security
deep packet inspection
Educational institutions
high risk hosts
high risk network flows
Iterative methods
Monitoring
Ports (Computers)
provenance aware security risk analysis
risk analysis
risk management
risk score
security
« first
‹ previous
1
2
3
4
5
6