Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random processes
biblio
The chaotic-based challenge feed mechanism for Arbiter Physical Unclonable Functions (APUFs) with enhanced reliability in IoT security
Submitted by grigby1 on Fri, 03/17/2023 - 10:34am
uncertainty
Process Variations
physical unclonable functions
chaotic sequence
Voltage fluctuations
random key generation
Resiliency
Physical Unclonable Function
key generation
random processes
security
resilience
integrated circuits
Scalability
Hardware
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object
Submitted by grigby1 on Fri, 09/30/2022 - 9:29am
Compositionality
special technical means
Materials reliability
Markov random process
Resiliency
model
random processes
Telecommunications
information theoretic security
confidential information
Probabilistic logic
information security
composability
Data models
Scalability
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
Method of Image Style Transfer Based on Edge Detection
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
neural style transfer
neural network style transfer
neural network processing
markov random field neural network algorithm
Markov random field
edge information loss
edge information image
content image edge structure
image style transfer
Scalability
Predictive Metrics
edge detection
Markov processes
neural network
random processes
neural nets
pubcrawl
Resiliency
biblio
Random selective block encryption technique for image cryptography using chaotic cryptography
Submitted by aekwall on Mon, 01/18/2021 - 10:20am
chaotic cryptography
secured image transmission systems
random selective block encryption technique
random data streaming
plaintext attack
plain text imaging
image cryptography
hybrid chaotic map
dynamic random growth technique
data stream generation
chaotic
block-based image encryption
Scalability
permutation
Diffusion
Image Processing
encryption
random processes
Metrics
pubcrawl
Resiliency
decryption
Cryptography
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Universal Privacy Guarantees for Smart Meters
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
customer privacy
Silicon
battery management systems
Stochastic processes
power distribution
cyber physical systems
maximal information leakage
stochastic models
battery charging policy
adaptive codes
electricity distribution system efficiency
home batteries
nonprobabilistic permuting channels
random processes
universal privacy guarantees
user energy consumption
Control Theory and Privacy
Scalability
utility provider
energy cost
smart meters
energy consumption
energy management systems
power engineering computing
cyber-physical systems
Measurement
Mutual information
privacy
batteries
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A Novel Approach of Image Encryption Using Chaos and Dynamic DNA Sequence
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
Human behavior
two dimension Sine-Henon alteration map
two dimension logistic map
reversible DNA operations
Resiliency
random processes
pubcrawl
pseudorandom sequences
privacy
Predictive Metrics
plain image pixel
Logistics
logistic map
image encryption scheme
Image coding
Cryptography
Histograms
Heuristic algorithms
encryption of image
encryption
encoding
dynamic DNA sequence
DNA sequence
DNA operations cipher image
DNA cryptography
DNA converted pixel
DNA
distorted image
Different types of attacks and Statistical Analysis
biblio
Quantitative Analysis of Network Address Randomization's Security Effectiveness
Submitted by grigby1 on Fri, 05/15/2020 - 10:57am
quantitative analysis
statistical analysis
static network address
security effectiveness analysis
Scalability
Resiliency
resilience
Reconnaissance
randomization space
randomization frequency
random processes
quantitative security effectiveness analysis
Analytical models
pubcrawl
Network reconnaissance
Network Address Translation
network address randomization techniques
network address randomization
moving target defensee
general attacks
Fingerprint recognition
computer network security
Complexity theory
biblio
Complex of Description Models for Analysis and Control Group Behavior Based on Stochastic Cellular Automata with Memory and Systems of Differential Kinetic Equations
Submitted by grigby1 on Fri, 04/24/2020 - 11:01am
social sciences
possible transitions
preferences in social and economic systems
privacy
probability
pubcrawl
random link network
random processes
resilience
Resiliency
oscillating behaviors
sociological data
stochastic cellular automata
Stochastic processes
transition probability matrix
United States
United States president
user actions
variable memory
voters
differential kinetic equations
candidate C
cell memory
cellular automata
complex social systems
composability
control group behavior
delay time intervals
description models
differential equations
AD 2015 to 2016
electoral campaign
electoral processes
events prediction
interaction process
Kinetic theory
memory steps
Metrics
node types
numeric parameter
1
2
3
next ›
last »