Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 12:39pm
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 12:36pm
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
"Towards Making Systems Forget with Machine Unlearning"
Submitted by grigby1 on Thu, 02/23/2017 - 12:32pm
machine learning algorithms
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
pubcrawl170105
pubcrawl
privacy risks
machine unlearning
Adversarial Machine Learning
Learning systems
learning (artificial intelligence)
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
biblio
"Using Honey Templates to Augment Hash Based Biometric Template Protection"
Submitted by grigby1 on Thu, 02/23/2017 - 12:30pm
hash
Sugar
Servers
secure sketch
pubcrawl
privacy leakage concern
machine learning based protected template generation protocol
learning (artificial intelligence)
honeywords
honeyword
honey templates
honey template
hashed password cracking
hash based BTPS
hash based biometric template protection
authentication
fuzzy vault
fuzzy commitment
Databases
database leakage
Data protection
data privacy
Cryptography
cryptographic hash calculation
biometrics (access control)
biometric template verification
biometric template storage
pubcrawl170105
biometric template protection
biometric template database leakage detectability
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 12:26pm
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 12:20pm
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
biblio
"Cost and Communication Efficient Auditing over Public Cloud"
Submitted by grigby1 on Thu, 02/23/2017 - 12:16pm
pubcrawl
third party authentication system
third party auditor
Storage technology
storage management
storage collection
software performance evaluation
Servers
security of data
security
Secure storage
auditing
Protocols
Memory
database
data storage security
data privacy
data acquisition security
cost efficient auditing
communication efficient auditing
cloud data security
Cloud Computing
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 11:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
« first
‹ previous
…
1509
1510
1511
1512
1513
1514
1515
1516
1517
next ›
last »