Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
A framework to improve E-seva services through E-governance by using DNA cryptography
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
computer science
Decoding
DNA
DNA cryptography
DNASequence
E governance
E-Certificates
encoding
Human behavior
LBP
Metrics
privacy
pubcrawl
public key cryptography
Resiliency
biblio
Cross-Disciplinary Survey on \#34;Data Science \#34; Field Development: Historical Analysis from 1600s-2000s
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Databases
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
Big Data
data science
Data models
computer science
composability
collaboration
Cloud Computing
Business
biblio
Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes Classifier
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
transfer learning
Training data
Training
target projects
target data distribution
standards
source projects
software quality
software engineering
Software
quality assurance
pubcrawl
program debugging
Bayes methods
Predictive models
Predictive Metrics
pattern classification
novel reweighting mechanism
Nai¨ve Bayes classifier
Metrics
Insurance
cross-project defect prediction
credibility theory based naive Bayes classifier
credibility theory
CPDP
computer science
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
A simple method for anonymous tag cardinality estimation in RFID systems with false detection
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Computational modeling
computer science
estimation
Human behavior
Human Factors
privacy
Protocols
pubcrawl
radiofrequency identification
Resiliency
RFID
RFIDs
biblio
A new multi-proxy multi-signature scheme based on elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
computer science
Conferences
digital signatures
Elliptic curve cryptography
Elliptic curves
Metrics
multi-proxy
multi-signature
pubcrawl
Resiliency
Scalability
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"A project-based multi-disciplinary elective on digital data processing techniques"
Submitted by grigby1 on Tue, 02/14/2017 - 12:43pm
Elliptic curves
undergraduate majors
students feedback
source coding
registration statistics
pubcrawl170102
project-based multidisciplinary elective
project based
polynomials
multi-disciplinary
Internet-of-Things
Image coding
fresh graduates
error correcting codes
encryption
assessment data
Electrical Engineering
educational courses
digital data processing techniques
Data processing
data handling
Cryptography
course outcomes
computer science
Computer Engineering
computer aided instruction
Compression
Cloud Computing
channel coding
Big Data centers
biblio
"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Submitted by grigby1 on Tue, 02/14/2017 - 12:16pm
encryption
three-step security
Steganography
standards
smart phones
secured steganography algorithm
QRTM Code
QR codes
QR code
pubcrawl170102
mobile radio
android
encrypted secret message
Cryptography
cryptanalysis
Computers
computer science
Ciphers
bit level columnar transposition method
Android phone
Android mobile environment
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »