Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Optimal Thresholds for Intrusion Detection Systems
Submitted by grigby1 on Tue, 05/16/2017 - 12:35pm
composability
computational complexity
economics of security
game theory
IDS
intrusion detection system
Intrusion Detection System (IDS)
Intrusion Detection Systems
pubcrawl
Resiliency
Stackelberg equilibrium
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
attack graph
computational complexity
computer network security
Heuristic algorithms
k zero day safety
network hardening
network security
network security metric
Security Metrics
software flaws
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
biblio
Robust Hashing With Local Models for Approximate Similarity Search
Submitted by BrandonB on Wed, 05/06/2015 - 11:55am
robust hashing
Nickel
optimal hash code
query data point
query hash code
query processing
real-life datasets
RHLM
robust hash function learning
loss function
robust hashing-with-local models
Robustness
search efficiency
search quality
Training
Training data
training data points
training dataset
high-dimensional data
approximate similarity search
binary hash codes
computational complexity
database point
Databases
dimensionality curse
feature dimensionality
file organisation
1-norm minimization
high-dimensional data point mapping
indexing
l2
Laplace equations
Linear programming
local hashing model
local structural information
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 11:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 9:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Affine-Projection-Like Adaptive-Filtering Algorithms Using Gradient-Based Step Size
Submitted by BrandonB on Wed, 05/06/2015 - 9:25am
gradient-based step size
Vectors
system-identification
steady-state misalignment
Steady-state
mean-square-error analysis
mean-square error in adaptive filtering
mean square error methods
Matrix decomposition
Least squares approximations
input signal matrix
a posteriori error vector
gradient methods
convergence
computational complexity
channel-equalization
Algorithm design and analysis
affine-projection-like adaptive-filtering algorithms
affine-projection algorithms
adaptive-filtering algorithms
adaptive filters
acoustic-echo-cancelation applications
biblio
Variable Window for Outlier Detection and Impulsive Noise Recognition in Range Images
Submitted by BrandonB on Wed, 05/06/2015 - 9:22am
index distance weighted mean filter
wavelet transforms
Variable window
range image denoising
quality assessment
outlier IN detection
outlier detection
noise reduction
Noise
nearest nonIN neighbors searching process
multiline surface
invader occlusion
Indexes
adaptive variable window size determination
impulsive noise recognition
impulsive noise denoising
impulse noise
image recognition
image denoising
Educational institutions
dynamic environment
dropout IN detection
discriminant criteria
computational complexity
Algorithm design and analysis
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »