Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 9:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
Quickest Detection of Time-Varying False Data Injection Attacks in Dynamic Smart Grids
Submitted by grigby1 on Mon, 12/30/2019 - 1:22pm
Human behavior
worstcase expected detection delay
time-varying state variables
time-varying false data injection attacks
smart power grids
security of data
Resiliency
resilience
pubcrawl
power system security
power engineering computing
IEEE standards
IEEE standard power system
False Data Detection
FDIAs
false data injection attacks
expected false alarm period
dynamic smart grids
dynamic smart grid systems
Cybersecurity
cyber physical systems
cumulative-sum-type algorithms
cumulative sum
computational complexity
computational complex scaling
composability
biblio
Realization of RSA Cryptographic Algorithm Based on Vector-Module Method of Modular Exponention
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
pubcrawl
Vectors
vector-module method
vector-modular method
Time complexity
temporal complexity
Scalability
RSA cryptosystem
RSA cryptographic algorithm
Resiliency
public key cryptography
computational complexity
Modular Multiplication
modular exponention
modular exponentiation
graph theory
exponentiation
encryption
Economics
Decoding
computer security
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 9:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Data Encryption Standard
triple form
Triple DES
triple chaotic cryptography
single chaotic cryptography
Sensitivity
rayscale image
Periodic structures
performance speed
multimedia cryptography
MatLab simulation
Digital filters
DES
Cryptography
Chaos in Digital Filter
chaotic cryptography
chaos
Predictive Metrics
digital filter
computational complexity
Data protection
composability
pubcrawl
Resiliency
encryption
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
Breaking the Circuit-Size Barrier in Secret Sharing
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
security
privacy
Cryptography
theoretic techniques
Theory of computation
computational complexity
circuit complexity
communication complexity
Cryptographic Protocols
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 9:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »