Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
The role of triggers in database forensics
Submitted by BrandonB on Mon, 05/04/2015 - 2:28pm
forensic interpretation
SQL standard
SQL
Reliability
processes
Monitoring
methods
metadata
meta data
Irrigation
Forensics
attribution processes
Digital Forensics
digital forensic analysis methods
digital forensic analysis
Dictionaries
Databases
database triggers
database trigger handling
database trigger analysis
database forensics
data definition level
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Do you think your passwords are secure?
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
encryption
usability
ubiquitous computing
ubiquitous access
security-critical application
password security
mobile device
message authentication
key derivation function
Humanoid robots
Android password-manager
direct decryption
Databases
Cryptography
cryptographic key
bruteforce attack
authorisation
authentication
Androids
biblio
A Power Mask based audio fingerprint
Submitted by BrandonB on Mon, 05/04/2015 - 12:11pm
1f noise
audio fingerprint
audio signal processing
Bit error rate
Databases
fingerprint bits
music
Music Recognition
noise resistance
Power Mask
Resistance
Robustness
Signal to noise ratio
weight matrix
biblio
Audio fingerprinting to identify TV commercial advertisement in real-noisy environment
Submitted by BrandonB on Mon, 05/04/2015 - 11:49am
Noise
TV commercial advertisement identification
TV
Transforms
Time-frequency Analysis
television broadcasting
Servers
salient audio peak pair fingerprints
Robustness
real-noisy environment
acoustic noise
Fingerprint recognition
feature extraction
Databases
CQT
Constant Q Transform
audio signal processing
audio fingerprinting extraction method
Audio fingerprinting
audio content identification
biblio
Fingerprint information maximization for content identification
Submitted by BrandonB on Mon, 05/04/2015 - 11:30am
information bottleneck method
quantizer optimization
Quantization (signal)
optimization
optimisation
mutual information across
Mutual information
learning based fingerprint
Joints
information retrieval
Information maximization
Approximation methods
Information bottleneck
greedy optimization
fingerprint information maximization
filter optimization
distortion channel
Dictionaries
Databases
Content Identification
content fingerprint
Audio fingerprinting
biblio
Object retrieval using scene normalized human model for video surveillance system
Submitted by BrandonB on Fri, 05/01/2015 - 9:37am
Cameras
Databases
feature extraction
human model
Image color analysis
image retrieval
multiple ellipse human model
object retrieval
object tracking
retrieval system
scene calibration
scene normalized human model
Shape
surveillance system
video surveillance
video surveillance retrieval system
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 3:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 1:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
next ›
last »