Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability density
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
image encryption
probability density
optimized henon mapping
optimized henon
new 2d-logistic chaotic System
Lyapunov exponents
image encryption schema
image cryptosystem
hybrid optimized chaotic system
henon chaotic system
compounded chaotic system
chaotic image encryption algorithm
2D logistic chaotic system
Henon mapping
chaotic cryptography
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Security analysis
Image coding
Correlation
optimisation
Logistics
composability
pubcrawl
Resiliency
encryption
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure