Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer graphics
biblio
Process trees & service chains can serve us to mitigate zero day attacks better
Submitted by grigby1 on Thu, 12/01/2022 - 2:21pm
standards
Computer graphics
users
Zero day attacks
human computer interaction
Data visualization
defense
computer security
composability
tools
Software
Resiliency
resilience
Metrics
pubcrawl
machine learning
cyber security
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
biblio
Conundrum-Pass: A New Graphical Password Approach
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
graphical password system
pattern locks
unlocking time
trivial password methodologies
textual passwords
smudge attacks
shoulder surfing
security element
pattern lock
Password Submission
Password Registration
multiple chunks
mobile computing environment
graphical passwords
Scalability
graphical password schemes
Graphical Password
external attacks
conundrum-pass
password guessing
Computer graphics
dictionary attacks
authentication
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation
Submitted by Katie Dey on Mon, 09/09/2019 - 3:29pm
user evaluation
HMT
Graphics
Computer graphics
visualization
Human-computer interaction
Alex Endert
IN-SPIRE
Computational modeling
Data models
Data visualization
Analytical models
Semantics
cognition
human-in-the-loop system design
model steering functionality
user analytic process
user interaction methodology
analytical reasoning
Computation
visual analytics
semantic interaction
human computer interaction
data visualisation
data analysis
Human Machine Teaming
Interactions
C3E 2019
biblio
A new mesh simplification algorithm based on quadric error metric
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
Measurement
vertices geometric information
triangular mesh
solid modelling
real-time interactive problem
quadric error metric
pubcrawl170111
mesh simplification algorithm
mesh simplification
3D image processing
Image Processing
Image edge detection
equilateral triangles
Computer graphics
Computational modeling
computational geometry
Approximation algorithms
Algorithm design and analysis