Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cameras
biblio
Source Device Attribution of Thermal Images Captured with Handheld IR Cameras
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
low-cost handheld thermal camera
thermal imaging devices
Temperature measurement
source device attribution method
source camera
Radiometry
radiometric data
pubcrawl
pocket-size thermal cameras
noise reduction
Metrics
attribution
infrared imaging
Human behavior
handheld IR cameras
Fingerprint recognition
digital images
digital forensics literature
Correlation
composability
Cameras
biblio
RADIS: Remote Attestation of Distributed IoT Services
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
RADIS
distributed IoT service
Distributed IoT Services
inter-operable IoT system
Interoperable IoT
interoperable IoT devices
malicious remote service
modified software detection
physical tampering attacks
control-flow attestation technique
Remote Attestation
remote attestation of distributed IoT services
remote attestation protocols
remote trusted party
security technique
Service Flow
trust-worthiness
Trusted Computing
Monitoring
Internet of Things
IoT devices
attestation
security
performance evaluation
Protocols
Software
computer network security
Resiliency
Human behavior
pubcrawl
composability
Cameras
open systems
Internet of Things systems
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 12:21pm
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Physical Integrity Attack Detection of Surveillance Camera with Deep Learning based Video Frame Interpolation
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
learning (artificial intelligence)
video surveillance
Surveillance Camera Physical Tampering
surveillance camera
security of data
Scalability
Resiliency
resilience
pubcrawl
physical spaces
physical security attacks
physical integrity attack detection
physical configuration
physical attributes
Metrics
Anomaly Detection
interpolation
integrity attacks
deep video
deep learning-based video frame interpolation
deep learning algorithms
deep learning
cyber-physical systems
cyber security attacks
cyber physical security
cyber physical devices
cyber physical attacks
Cameras
camera positions
biblio
Intelligent Border Security Intrusion Detection using IoT and Embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
control systems
water bodies
thermal imaging camera
intelligent border security intrusion detection
infrared imaging
harsh weather
geographical conditions
FLIR
border area monitoring
Robot sensing systems
video surveillance
Internet of Things
computerised monitoring
security
Cameras
Metrics
composability
pubcrawl
Resiliency
Raspberry Pi
embedded systems
Software
Monitoring
security of data
IoT
biblio
Research on Extending Person Re-identification Datasets Based on Generative Adversarial Network
Submitted by grigby1 on Fri, 06/12/2020 - 12:22pm
neural nets
Training data
Training
surveillance camera network
Scalability
Resiliency
resilience
pubcrawl
person re-identification datasets
Person re-identification
Person Re-ID
pedestrians image
pedestrians
object detection
Cameras
Metrics
learning (artificial intelligence)
label smoothing regularization for outliers with weight algorithm
Image color analysis
Generators
generative adversarial networks
generative adversarial network
Generative Adversarial Nets
Generative Adversarial Learning
feature extraction
deep training
deep learning
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »