Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
parameter selection
biblio
Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
differential privacy
Computing Theory and Privacy
user preferences
parameter epsilon
mechanism design
epsilon voting
differentially private system
parameter selection
Aggregates
Statistics
Scalability
game theory
Companies
standards
Computational modeling
privacy
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
Parameter selection for swarm intelligence algorithms \#x2014; Case study on parallel implementation of FSS
Submitted by K_Hooper on Wed, 05/02/2018 - 9:37am
number-of-iterations
swarm intelligence algorithms
Swarm Intelligence
Sociology
Silicon
SI algorithms
search problems
pubcrawl
problem complexity
population size
parameter selection
parallel implementation
optimisation
complex optimization problems
Iterative methods
FSs
Frequency selective surfaces
Fish School Search
Fish
execution time
Correlation
computational intelligence
computational complexity
composability
Complexity theory
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:18am
moving target defense mechanism
Wireless communication
telecommunication network reliability
tactical cognitive radio MANET
source selective jamming attack combation
source selective jammer block transmission
source MAC address
secure communication
seamless communication
reliable communication
random address assignment
probability
parameter selection
Ad hoc networks
mobile computing
mobile ad hoc networks
military communication
Jamming
interference suppression
flipped address mechanism
delays
computer network security
Communication system security
cognitive radio
address manipulation