Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
biblio
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
directional antennas
game theoretic security
wireless nodes
wireless ad hoc networks
Thin film transistors
Resilience to Selfishness
Promoting cooperation
packet dropping mitigation
GTAMR protocol
game-theoretic adaptive multipath routing protocol
ERTFT game theoretic strategy
Energy states
Scalability
Ad-hoc Wireless Networks Security
Predictive Metrics
Human Factors
Games
Ad hoc networks
Routing
Routing protocols
pubcrawl
game theory
security
telecommunication security
biblio
Crowd-Empowered Privacy-Preserving Data Aggregation for Mobile Crowdsensing
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Scalability
pubcrawl
data aggregation
Human Factors
Predictive Metrics
Privacy-preserving
crowd sensing
Incentive mechanism
game theoretic security
biblio
Secure Reverse k-Nearest Neighbours Search over Encrypted Multi-dimensional Databases
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Scalability
pubcrawl
encryption
Human Factors
Predictive Metrics
cloud database services
confidential multi-dimensional data retrieval
data outsourcing
secure cloud computing
game theoretic security
biblio
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Submitted by grigby1 on Tue, 12/17/2019 - 12:22pm
resilience
pubcrawl
Metrics
Resiliency
composability
cyber-physical systems
cyber-physical system
Symbolic Execution
Concurrency
cache
Side-channel attack
timing
Predictive Metrics
biblio
A Robust and Efficient Defense Against Use-after-Free Exploits via Concurrent Pointer Sweeping
Submitted by grigby1 on Tue, 12/17/2019 - 12:22pm
resilience
pubcrawl
Metrics
Resiliency
composability
use-after-free
cyber-physical systems
software security
cyber-physical system
Concurrency
vulnerability defense
Predictive Metrics
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
…
next ›
last »