Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
biblio
Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
Protocols
Xilinx High-Level Synthesis
sponge-based SHA-3 hashing algorithm
sponge functions
SHA-2
SHA-1
Resiliency
resilience
quantum-secure sponge-based hash message authentication protocol
quantum cryptography
quantum computing standpoint
quantum computing
pubcrawl
Compositionality
post-quantum-secure SHA-3 hash message authentication
pipelined version
optimized version
optimization
networking security protocols
message authentication
hashing standard
Hash functions
hash algorithms
Hardware
fundamental building block
Cryptographic Protocols
biblio
Simultaneous diagnosis of multiple parametric faults based on differential evolution algorithm
Submitted by aekwall on Mon, 05/18/2020 - 10:48am
fault diagnosis
multiple fault diagnosis
simultaneous diagnosis
multiple parametric faults
multiple abrupt faults diagnosis
multifault parameters estimation
Lipschitz nonlinear system
differential evolution algorithm
differential evolution
fault detection
nonlinear systems
Resiliency
evolutionary computation
Nonlinear system
estimation
Human Factors
cyber physical systems
Statistics
Sociology
optimization
Metrics
pubcrawl
biblio
Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
optimization
hyper-parameter optimization and realistic network traffic cyber dataset
hyper-parameter optimization tuning
Intrusion Detection
intrusion detection system
latest intrusion detection dataset
Metrics
network intrusion detection
neural nets
neural network algorithms
cyber-physical system traffic data
pubcrawl
realistic cyber dataset CSE-CIC-IDS2018
realistic cyber defense dataset
receiver operator characteristic
Resiliency
telecommunication traffic
tuning
web services
AWS
Human behavior
Amazon Web Services
area under ROC curve
Artificial Intelligence
artificial intelligence algorithms
artificial intelligence based network intrusion detection
artificial intelligence security
artificial intelligence technique
Artificial Neural Networks
Human Behavior and Cybersecurity
botnet
botnet attack detection
Canadian institute for cybersecurity
CIC
Cloud Computing
composability
computer network security
CSE-CIC-IDS2018
biblio
Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
evolutionary computation
Neural Network Security
security situation prediction
Neurons
network security situation awareness
hybrid rice optimization algorithm
HRO
Evolutionary algorithms
BP Neural Network
BP network security posture prediction method
backpropagation neural network
Backpropagation
Biological neural networks
security of data
Prediction algorithms
optimisation
Metrics
neural nets
Communication networks
optimization
Resiliency
resilience
policy-based governance
pubcrawl
security
collaboration
biblio
Network Security Situation Prediction Model Based on Multi-Swarm Chaotic Particle Optimization and Optimized Grey Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
particle swarm optimisation
Neural Network Security
prediction model
optimized grey neural network
nonlinear mapping
network situation value
network situation
network security situation prediction model
network security protection
network security incidents
multiswarm chaotic particle optimization
MSCPO
mathematical expressions
grey systems
grey neural network
convergence speed
collaboration
Metrics
neural nets
Communication networks
cyber security
Data models
Mathematical model
optimization
computer network security
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
Predictive models
biblio
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
confidential label
privacy models and measurement
Sibson mutual information
privacy-utility trade-off
privacy preserving data disclosure mechanisms
privacy metric
output data vector
MNIST dataset
maximal information leakage
Information Theoretic Privacy
information theoretic measures
FERG dataset
data vectors
data driven setting
data privacy
Bernoulli-Gaussian model
auto-encoders
privacy preservation
distortion
generative adversarial networks
gaussian distribution
Measurement
Mutual information
optimization
Metrics
privacy
pubcrawl
Data models
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
file
A Dynamic Optimization Framework For Connected Automated Vehicles In Urban Environments
Submitted by Christos Cassandras on Tue, 04/14/2020 - 4:54pm. Contributors:
Christos Cassandras
Yannis Paschalidis
autonomous vehicles
Transportation
optimization
control.
Lightning Talks
1645681
CPS PI Meeting 2019
Presentation
biblio
A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance
Submitted by grigby1 on Mon, 04/06/2020 - 2:22pm
network overhead
telecommunication security
Statistics
Sociology
SNGA
security performance
security issues
security
Resiliency
resilience
pubcrawl
optimization
optimal solution
Niche genetic algorithm
coding operation
network coding optimization scheme
network coding optimization
network coding
multitarget niche genetic algorithm
Metrics
k-secure network coding mechanism
k-secure network coding
information security
genetic algorithms
fitness function
encoding
cyber physical systems
composability
biblio
Authenticated Network Coding for Software-Defined Named Data Networking
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Switches
Software-Defined named Data Networking
MIP problem
Internet architecture
homomorphic signature scheme
cooperative network coding mechanism
authenticated network coding
cyber physical systems
cache storage
network coding
Homomorphic encryption
encoding
Predictive Metrics
security of data
named data networking
cooperative communication
digital signatures
internet
optimization
Routing
composability
pubcrawl
Resiliency
software defined networking
security
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »