Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resiliency
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
authentication
Broadcast Authentication
authentication codes
Galois fields
Human Factors
codes
information theoretic security
Compositionality
Receivers
composability
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
biblio
Employing Information Theoretic Metrics with Data-Driven Occupancy Detection Approaches: A Comparative Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
Occupancy Detection
Information Gain
Gini Impurity Index
cross-entropy
Human Factors
Temperature distribution
information theoretic security
Signal processing algorithms
Compositionality
Measurement
composability
signal processing
Scalability
Radio frequency
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
information security
collaboration
biblio
Development of a Model for Managing the Openness of an Information System in the Context of Information Security Risks of Critical Information Infrastructure Object
Submitted by grigby1 on Fri, 09/01/2023 - 1:21pm
composability
functional approach
critical information infrastructure facility
information resources
Human Factors
information security system
unauthorized access
Context modeling
information theoretic security
Compositionality
Information systems
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
risk management
information security
biblio
Compliance Checking Based Detection of Insider Threat in Industrial Control System of Power Utilities
Submitted by grigby1 on Fri, 08/25/2023 - 2:43pm
Industries
remote charge control
compliance check
business process component
Resiliency
power system reliability
Electrical Engineering
Policy Based Governance
control systems
process control
integrated circuits
insider threat
industrial control system
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
security
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 2:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »