Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl
biblio
"Outlier identification via randomized adaptive compressive sampling"
Submitted by grigby1 on Tue, 02/21/2017 - 11:47am
Adaptive and compressive sensing
adaptive compressive sampling
adaptive sensing
automated surveillance
compressed sensing
computer vision
Imaging
outlier columns
outlier identification
pubcrawl
robust PCA
saliency map estimation tasks
Silicon
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 12:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming
file
DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking
Submitted by awhitesell on Wed, 07/13/2016 - 2:13pm
CPS Domains
Energy Sector
Smart Grid
Science of Security
neural networks security
Smart Grid Privacy
UIUC
software-defined networking
Smart Grid
Science of Security
Resiliency
pubcrawl
policy-based governance
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
Neural networks
neural network
network security
networ emulation
microgrid
Metrics
Energy Sector
Electrical power system simulation
CPS Domains
UIUC
Network Security
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking Emulation
Submitted by awhitesell on Wed, 07/13/2016 - 2:13pm
CPS Domains
Energy Sector
Smart Grid
Science of Security
Neural networks
UIUC
software-defined networking
Smart Grid
Science of Security
Resiliency
pubcrawl
policy-based governance
NSA SoS Lablets Materials
neural networks security
Smart Grid Privacy
neural network
network security
networ emulation
microgrid
Metrics
Energy Sector
Electrical power system simulation
CPS Domains
A Hypothesis Testing Framework for Network Security
UIUC
Network Security
NSA SoS Lablets Materials
file
Rumor Source Obfuscation on Irregular Trees
Submitted by awhitesell on Wed, 07/13/2016 - 12:49pm
Science of Security
anonymity
anonymous messaging
Anonymous Social Media
Measurement
NSA SoS Lablets Materials
privacy anonymity
privacy models
privacy models and measurement
Privacy Protections
pubcrawl
Resiliency
Rumer Spreading
Scalability
Science of Security
UIUC
work factor metrics
Privacy Protections
UIUC
NSA SoS Lablets Materials
Anonymous Messaging
biblio
Rumor Source Obfuscation on Irregular Trees
Submitted by awhitesell on Wed, 07/13/2016 - 12:48pm
Science of Security
anonymity
anonymous messaging
Anonymous Social Media
Measurement
NSA SoS Lablets Materials
privacy anonymity
privacy models
privacy models and measurement
Privacy Protections
pubcrawl
Resiliency
Rumer Spreading
Scalability
Science of Security
UIUC
Privacy Protections
UIUC
NSA SoS Lablets Materials
biblio
Vulnerability of Transportation Networks to Traffic-Signal Tampering
Submitted by Katie Dey on Mon, 04/11/2016 - 11:20am
Resilient Systems
Science of Security
pubcrawl
cps resiliency
Resiliency
attack-resilience
Cyber-security
network security
Resilient Systems
Science of Security
Security in Hardware
SURE Project
tampering attack
traffic model
Transportation network
Network Security
Security in Hardware
biblio
A Method of Evaluation for Insider Threat
Submitted by BrandonB on Wed, 05/06/2015 - 9:42am
pubcrawl
Analytical models
Cloud Computing
Computer crime
Computers
cyber security
Educational institutions
insider threat
insider threat analysis
insider threat evaluation
insider threat mitigation
Organizations
security of data
System Dynamic
vulnerability scanner
« first
‹ previous
…
1509
1510
1511
1512
1513
1514
1515
1516
1517