Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information theory
biblio
Differential Privacy As a Mutual Information Constraint
Submitted by grigby1 on Mon, 05/22/2017 - 1:45pm
composability
Computing Theory
Control Theory
differential privacy
Human behavior
information theory
privacy
pubcrawl
relational database security
Resiliency
Scalability
biblio
Optimal Power Control and Rate Adaptation for Ultra-Reliable M2M Control Applications
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
telecommunication power management
rate adaptation problem
reliability requirements
Scheduling algorithms
sensor nodes
Shannon capacity formulation
signal-to-interference-plus-noise ratio
SINR
stringent timing
telecommunication control
pubcrawl170110
telecommunication scheduling
transmission delay
transmission power
transmission schedule
transmitting nodes
ultrareliable M2M control
ultrareliable machine-to-machine control
wireless channels
Wireless communication
limited battery resources
additive white Gaussian noise wireless channel
AWGN channels
AWGN wireless channel
continuous rate transmission
delay error
delays
discrete rate transmission
energy consumption
information theory
Adaptation models
Mobile communication
optimal control
optimal power control
optimization
packet error
polynomial time algorithm
power consumption
power control
biblio
"Analog to information converter based on random demodulation"
Submitted by grigby1 on Tue, 02/21/2017 - 1:00pm
information theory
TIQ comparator
Shannon theorem
sampling rate
random demodulation
pubcrawl170104
Power dissipation
power consumption
Nyquist theorem
Mixers
low-pass filters
low-pass filter
low dynamic range
linear feedback shift register
ADC
high power consumption
gilbert cell mixer
Educational institutions
Demodulation
computer architecture
compressive sensing technique
compressive sensing
compressed sensing
analogue-digital conversion
Analog-digital conversion
analog to information converter
analog to digital converters
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Fri, 05/01/2015 - 8:40am
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Thu, 04/30/2015 - 12:49pm
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
profile
Rohit Negi
Wireless communications
signal processing
secure communicatiohs
queuing theory
networking
information theory
coding for communication systems
file
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
Submitted by Anonymous on Tue, 07/16/2013 - 9:57am. Contributor:
Joseph Bonneau
Abstract
Science of Security
authentication
Data mining
information theory
Statistics
University of Cambridge
Academia
Position Paper
Cyber Security
« first
‹ previous
1
2
3
4
5