Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Robustness
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
A secure and reliable channel error correction technique for picode
Submitted by grigby1 on Tue, 01/23/2018 - 2:59pm
2D Barcode
Algorithm design and analysis
BCH code
Cryptography
cyber physical systems
Decoding
encoding
modulation
pubcrawl
QR codes
Reed-Solomon codes
Resiliency
Robustness
Two dimensional displays
biblio
Robust video fingerprints using positions of salient regions
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
visualization
visual fingerprint generation methods
visual feature extraction
video signal processing
video retrieval
video fingerprint
TRECVID datasets
Spectrogram
search algorithm
robust video fingerprinting system
Robustness
robust audio fingerprint extraction approach
Acoustic Fingerprints
pubcrawl
Human behavior
greyscale video images
graphics processing units
graphics processing unit
Fingerprint recognition
Fingerprinting
feature extraction
discrete cosine transforms
Content-based copy detection
composability
biblio
Hardening Distributed and Encrypted Keyword Search via Blockchain
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
encryption
Keyword search
Monitoring
Peer-to-peer computing
Protocols
pubcrawl
Robustness
Scalability
security scalability
biblio
A secure steganography algorithm using compressive sensing based on HVS feature
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
secure steganography algorithm
Metrics
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Robustness
Scalability
Science of Security
secret messages
Image coding
security
Sparse matrices
steganographic technology
Steganography
stego image
stego object
Subsampling
Visual systems
data encapsulation
Bit Correction Rate
carrier object
collaboration
composability
compressed sensing
compressive sensing
compressive sensing technology
Cryptography
BCR
Data mining
digital image
discrete cosine transforms
Human behavior
Human Factors
human visual system features
HVS
HVS feature
biblio
Accountability in cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
Watermarking
security of data
Science of Security
Scalability
Robustness
responsibility-assignment
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Kullback-Liebler divergence
Attack detection
Human behavior
cyber-physical systems
cyber-physical system
CPS accountability
corrective measures
control systems
Conferences
composability
collaboration
causal information flow analysis
Casting
biblio
A Trust Management Based Framework for Fault-Tolerant Barrier Coverage in Sensor Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Resiliency
wireless sensor networks
wireless senor network
trust management-based framework
TrusDet
temporal sensory output correlation
telecommunication security
telecommunication network reliability
spatial sensory output correlation
sink-level decision
sensors
sensor-level detection
Robustness
collective voting
pubcrawl
intrusion tolerance
Intrusion Detection
HC-SR501 infrared sensor
Fuses
faulty sensor recognition
fault-tolerant intrusion detection algorithm
fault-tolerant barrier coverage
Fault tolerant systems
fault tolerance
Correlation
composability
biblio
Model-Based Attack Tolerance
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
message authentication
tools
software-based systems
Robustness
Resiliency
pubcrawl
monitoring method
Monitoring
model-based testing
model-based attack tolerance
Adaptation models
intrusion tolerance
internet
generic approach
formal verification
formal method
composability
authentication Web application
authentication
biblio
Correlation based highly secure image hiding in audio signals using wavelet decomposition and chaotic maps hopping for 5G multimedia communications
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
Multimedia communication
encoding
hidden data
higher hiding capacity
highly secure image hiding
Image coding
image data
image hiding process
Metrics
efficient secure steganography scheme
possible important applications
pubcrawl
Robustness
secret communications
security
Steganography
successive audio signals
wavelet transforms
correlation based image hiding
5G mobile communication
5G multimedia communications
actual audio samples
audio coding
Audio Steganography
chaotic communication
chaotic maps hopping
Compositionality
5G communication systems
cover audio file
cover audio signal
data encapsulation
data hiding
decomposition
differential pulse coding modulation technique
discrete wavelet transform
discrete wavelet transforms
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »