Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information theory
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
Games
wireless communications networks
telecommunication security
Security Evaluation
Scalability
Random variables
pubcrawl
Metrics
information theory
Human Factors
Ciphers
game theory
game theoretic security
Entropy
diagonal Game
cryptosystem security evaluation
Cryptography
cognitive radio networks
cognitive radio
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Statistical Security Incident Forensics Against Data Falsification in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 03/05/2018 - 1:18pm
pubcrawl
Trust models
supervised learning
statistical anomaly detection
Smart Grid
security incident forensics
Scalability
Resiliency
resilience
relative entropy
advanced metering infrastructure
privacy
Metrics
information theory
information forensics
Human Factors
Human behavior
data falsification
Control Theory
biblio
Security in Heterogeneous Distributed Storage Systems: A Practically Achievable Information-Theoretic Approach
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
pubcrawl
malicious user security
Measurement
Metrics
perfect secrecy
Probabilistic logic
Probabilistic Model Checker
Probabilistic Model Checking
probability
information-theoretic security
Reliability
reliability assessment
resilience
Resiliency
security
Security Metrics
spread spectrum communication
attack algorithms
information theory
heterogeneous distributed storage system security
formal verification
erasure codes
encryption
distributed storage systems
distributed memory systems
Cryptography
cryptographic/information-theoretic approach
Computing Theory
Compositionality
coding theory
classical cryptographic approach
caching systems
cache storage
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
biblio
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Submitted by grigby1 on Wed, 01/10/2018 - 12:21pm
Cryptography
wireless sensor networks
wireless networks
telecommunication security
security of wireless communication
Resiliency
Relays
pubcrawl
Physical layer
MIMO communication
MIMO
information theory based compromised nodes detection algorithm
information theory
array signal processing
cryptographic technique
cross-layered security approach
Cross Layer Security
cooperative sensor networks
cooperative MIMO radios
cooperative MIMO communication
cooperative communication
composability
cognitive radio networks
cognitive radio
beamforming
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
« first
‹ previous
1
2
3
4
5
next ›
last »