Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Variable Window for Outlier Detection and Impulsive Noise Recognition in Range Images
Submitted by BrandonB on Wed, 05/06/2015 - 8:22am
index distance weighted mean filter
wavelet transforms
Variable window
range image denoising
quality assessment
outlier IN detection
outlier detection
noise reduction
Noise
nearest nonIN neighbors searching process
multiline surface
invader occlusion
Indexes
adaptive variable window size determination
impulsive noise recognition
impulsive noise denoising
impulse noise
image recognition
image denoising
Educational institutions
dynamic environment
dropout IN detection
discriminant criteria
computational complexity
Algorithm design and analysis
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 11:30am
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm
Submitted by BrandonB on Tue, 05/05/2015 - 11:28am
Agent Based Paradigm
agents paradigm
Analytical models
business continuity
computer security
cybersecurity risk management
Educational institutions
Informatics
proactive behavior
risk management
SA
security management systems
security of data
sensors
situational awareness
biblio
A survey of Internet security risk over social networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Internet security risk
social risks
social networks
social networking integration
social networking (online)
Social network services
social network
security of data
security
rural community
risk management
Organizations
civil society
Internet risks
internet
hackers
global economy
geography climate
Educational institutions
dangers to society
crimes social networking
Computers
Communities
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm
biblio
A MIMO cross-layer precoding security communication system
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
MIMO cross-layer precoding security communication system
upper layer
telecommunication security
security
random array
precoding
physical layer security system
physical layer security cross-layer security
Physical layer
modulation
Bit error rate
MIMO cross-layer precoding secure communications
MIMO communication
MIMO
higher layer cryptography
Educational institutions
eavesdropper's channel
CSI
Cryptography
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 1:53pm
directory services
virtual shared servers
user authorization
token management system
token granting
Servers
security as a service
mutual authentication
internet
Educational institutions
Access Control
Databases
data correctness
Computers
cloud service
Cloud Computing
authorisation
authentication
access rights
biblio
Presentation 9. Attribute assurance for attribute based access control
Submitted by BrandonB on Mon, 05/04/2015 - 1:52pm
Communities
subject attributes
open systems
object attributes
NIST
National security
LOAA
level of attribute assurance
interoperability
Intelligence Community Policy Guidance
ICPG
environmental attributes
Educational institutions
Department of Defense and Intelligence Community
critical assets protection
attribute retrieval
authorisation
attribute-based authorization
attribute update
attribute based access control
attribute confidentiality
attribute integrity
ABAC
Access Control
access management
AP
attribute assurance
attribute provider
attribute repositories
biblio
A framework of awareness for artificial subjects
Submitted by BrandonB on Mon, 05/04/2015 - 1:29pm
optimisation
Artificial Intelligence
artificial subject awareness
Educational institutions
embedded systems
Engines
environment model
fault tolerant computing
History
Monitoring
Semantics
Predictive models
Robustness
self-awareness
self-healing
self-model
self-optimization
semantic attribution
semantic interpretation
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »