Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers
Submitted by grigby1 on Fri, 08/04/2023 - 10:16am
security
pubcrawl
Human behavior
Human Factors
Metrics
Scalability
Games
Nash Equilibrium
Bayes methods
heterogeneous networks
Costs
Bayesian game
game theoretic security
US Department of Homeland Security
network protection
non-zero-sum game
biblio
AI and Security: A Game Perspective
Submitted by grigby1 on Fri, 08/04/2023 - 10:15am
pubcrawl
Human behavior
Human Factors
Metrics
security
Safety
Scalability
Games
Robustness
data integrity
Shape
game theory
AI
Reinforcement learning
game theoretic security
Wildlife
biblio
SCGAN: Generative Adversarial Networks of Skip Connection for Face Image Inpainting
Submitted by grigby1 on Thu, 08/03/2023 - 1:12pm
Stability criteria
WGAN-GP
Skip connection
Face image inpainting
Double discriminators model
Superresolution
Generative Adversarial Learning
generative adversarial networks
social networking (online)
Training
Image edge detection
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Adversarial Networks-Based Speech Enhancement with Deep Regret Loss
Submitted by grigby1 on Thu, 08/03/2023 - 1:11pm
deep learning
Training
security
pubcrawl
Metrics
resilience
Resiliency
Scalability
Stability analysis
generative adversarial networks
Generative Adversarial Learning
music
deep regret analytic generative adversarial networks
speech based system
speech enhancement
biblio
LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths
Submitted by grigby1 on Thu, 08/03/2023 - 12:56pm
composability
Forward Error Encryption
Cyberspace
autonomous systems
forward error correction
Routing protocols
network architecture
real-time systems
Routing
Logic gates
security
Resiliency
resilience
Metrics
pubcrawl
IP networks
encryption
biblio
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Submitted by grigby1 on Mon, 07/31/2023 - 12:24pm
Cryptography
pseudorandom numbers
Pollard’s ρ
Elliptic curve cryptography (ECC)
Fuzzy Cryptography
Fuzzy logic
Internet of Things (IoT)
Elliptic curve cryptography
Protocols
Internet of Things
authentication
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Fuzzy Logic based Static Synchronous Series Compensator (SSSC) to enhance Power System Security
Submitted by grigby1 on Fri, 07/28/2023 - 2:35pm
Regulation
SSSC
power handling capacity
Pi
FACTS
damping of oscillation
damping
Fuzzy
System performance
security
Voltage control
Fuzzy logic
simulation
power transmission lines
Resiliency
resilience
Metrics
pubcrawl
biblio
Environmental Condition Monitoring and Decision Making System Using Fuzzy Logic Method
Submitted by grigby1 on Fri, 07/28/2023 - 2:34pm
Metrics
wireless sensor networks
wireless sensor network (WSN)
Temperature sensors
Temperature measurement
security
Resiliency
resilience
pubcrawl
Fuzzy Cryptography
Libelium
Fuzzy logic
Distributed databases
Decision Making
Cryptography
air pollution
advanced encryption standard (AES)
biblio
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment
Submitted by grigby1 on Fri, 07/28/2023 - 2:34pm
Information Centric Networks
AHP
Biological system modeling
Complexity theory
Ecosystems
Fuzzy logic
internet of medical things
IoMT
medical devices
Metrics
Organizations
pubcrawl
resilience
Resiliency
security
security assessment
biblio
Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images
Submitted by grigby1 on Fri, 07/28/2023 - 2:33pm
Image Processing
Steganography
security
Resiliency
resilience
pubcrawl
network security
Metrics
Measurement
Fuzzy Cryptography
Image edge detection
Histograms
Fuzzy logic
digital images
difference expansion
Data Security
data hiding
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »