Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Geometric group key-sharing scheme using euclidean distance
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
information theoretic security
wireless sensor networks
Wireless Sensor Network
sensor network
Scalability
Resiliency
pubcrawl
Policy
multicast communication
Metrics
Internet of Things
information-theoretic security
Broadcasting
human factor
Human behavior
group key sharing
geometric group key-sharing scheme
Euclidean distance
Elliptic curve cryptography
Cryptography
computational complexity
composability
collaboration
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 12:19pm
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 11:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
biblio
Resiliency Policies in Access Control Revisited
Submitted by grigby1 on Fri, 09/15/2017 - 10:48am
Access Control
computational complexity
Computing Theory
Control Theory
fixed-parameter tractability
pubcrawl
resilience
Resiliency
Security Policies Analysis
workflow satisfiability
biblio
Theory of Swarm Intelligence
Submitted by grigby1 on Fri, 08/18/2017 - 2:08pm
Ant colony optimization
combinatorial optimization
composability
Compositionality
computational complexity
particle swarm optimization
pubcrawl
runtime analysis
Swarm Intelligence
theory
biblio
The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design
Submitted by grigby1 on Mon, 05/22/2017 - 1:48pm
collaboration
composability
computational complexity
equilibrium computation
game theoretic security
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
security games.
biblio
Nondeterministic Extensions of the Strong Exponential Time Hypothesis and Consequences for Non-reducibility
Submitted by grigby1 on Wed, 05/17/2017 - 1:52pm
3-sum
all-pairs shortest path
computational complexity
conditional lower bounds
exponentiation
fine-grained complexity
nondeterminism
pubcrawl
Resiliency
seth
theoretical cryptography
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »