Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge detection
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
graph theory
security of data
security
Scalability
Resiliency
real-world insider threat data
pubcrawl
Organizations
Metrics
malicious threat groups
machine learning
learning (artificial intelligence)
Insider Threat Detection
Image edge detection
Anomaly Detection
graph convolutional networks
GCN
fraud detection
fraud
feature extraction
edge detection
Data models
convolutional neural nets
composability
associated threat groups
anomaly detection model
anomaly detection applications
biblio
Network Scanning and Mapping for IIoT Edge Node Device Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
pseudorandom periodic manner
Metrics
microcontroller units
microcontrollers
Monitoring
network scanning
network services
performance evaluation
predictive maintenance
MCU
pubcrawl
Resiliency
Scalability
scanning procedure
security
security of data
Servers
building block
light emitting diodes
Internet of Things
industrial networks
Industrial Internet of Things
industrial environment
industrial control
Image edge detection
IIoT edge node sensors
IIoT edge node device security
iiot
Hardware
edge device
edge detection
computer network security
composability
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
biblio
Research on Iris Edge Detection Technology based on Daugman Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:03pm
Hough algorithm
security
Scalability
Resiliency
pubcrawl
personal privacy
Metrics
Iris recognition
iris edge detection technology
Image edge detection
identity technology
Identity Security
biometrics (access control)
highly confidential privacy
frequency-domain analysis
Fingerprint recognition
face recognition
edge detection
daugman algorithm
data privacy
current society
convolution
composability
Calculus
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image
biblio
Cipher Modification Against Steganalysis Based on NIST Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
Image edge detection
testing
steganography detection
Steganography
steganalytic method
pubcrawl
privacy
NIST tests steganalysis
NIST
Metrics
Image Steganography
arithmetic codes
Image coding
encryption
encoding
edge detection
Cryptography
composability
Ciphers
cipher modification
arithmetic source compression coding
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 9:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 8:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
Submitted by grigby1 on Wed, 05/01/2019 - 10:34am
Metrics
verifying security policies
security policies
security of data
security
Scalability
Resiliency
resilience
Redundancy
pubcrawl
potential security breaches
Policy Validation and Correction.
pattern clustering
obtained clusters
nonallowed accesses
ABAC Policy
Image edge detection
edge detection
Conferences
composability
clustering technique
clustering
big data environments
Big Data
Anomaly Detection and Resolution
Anomaly Detection
access log based approach
Access Log
Access Control
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »