Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Scalability
biblio
IReF: Improved Residual Feature For Video Frame Deletion Forensics
Submitted by grigby1 on Fri, 09/01/2023 - 2:19pm
Forensics
inter-frame video forensics
Human Factors
Video Forensics
lighting
noise reduction
information forensics
Three-dimensional displays
Image edge detection
pubcrawl
Memory management
Jitter
deep learning
Scalability
Resiliency
resilience
Metrics
Human behavior
biblio
A Crawler-based Digital Forensics Method Oriented to Illegal Website
Submitted by grigby1 on Fri, 09/01/2023 - 2:19pm
network topology
network crime
illegal website
Crawler
Human Factors
Crawlers
automation
information forensics
information management
Digital Forensics
Tag clouds
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Data Manipulation and Digital Forensics Analysis on WhatsApp Application
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
social networking (online)
social media forensics
instant messaging applications
data manipulation
Freeware
Internet telephony
Human Factors
mobile forensics
Instant messaging
information forensics
information security
Digital Forensics
Databases
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A fuzzy decision tree reasoning method for network forensics analysis
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
Forensics
reasoning method
Network forensics analysis
Fuzzy decision tree
Human Factors
Current measurement
information forensics
Systematics
computer networks
information security
network security
computer science
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Progressive Standard Operating Procedures for Darkweb Forensics Investigation
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
Digital Forensics
Space technology
artifacts
Human Factors
Tor
drugs
cryptocurrency
darkweb
Weapons
information forensics
feature extraction
Forensics
information and communication technology
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Information Theory Based Evaluation Method For Wireless IDS: Status, Open Problem And Future Trends
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Human Factors
Solids
information theory
information theoretic security
Market research
uncertainty
Compositionality
Measurement
network security
composability
collaboration
Entropy
wireless sensor networks
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »