Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaos theory
biblio
New Image Encryption Algorithm based on Pixel Confusion-Diffusion using Hash Functions and Chaotic Map
Submitted by grigby1 on Fri, 08/11/2023 - 1:56pm
machine learning algorithms
pubcrawl
resilience
Resiliency
privacy
chaotic communication
Compositionality
Hash functions
Quantization (signal)
hash algorithms
image encryption
Resists
chaos theory
Diffusion processes
pixel confusion and diffusion
biblio
An Approach Towards Data Security Based on DCT and Chaotic Map
Submitted by grigby1 on Fri, 04/14/2023 - 4:01pm
Streaming media
discrete cosine transform
chaos theory
Resiliency
chaotic cryptography
Satellites
Steganography
Technological innovation
Robustness
encryption
chaotic communication
data privacy
Cryptography
Scalability
resilience
Metrics
pubcrawl
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
resilience
unique channel traits
traditional security policies
time series
Threshold secret sharing
telecommunication traffic
telecommunication channels
stable channel traits
security of data
security concern
secret reconstruction strategy
Scalability
Robustness
Resiliency
channel identifier
pubcrawl
one-dimensional time series
network traffic
network covert timing channel detection method
network covert timing channel
NCTC detection method
inter-packet delay
high-dimensional phase space
covert channels
Compositionality
chaos theory
chaos
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator