Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
biblio
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures
Submitted by BrandonB on Mon, 05/04/2015 - 1:18pm
government personnel
threat identification framework
security of data
proactive framework
private business
physical weapons
malicious actor
Law
internet
international norms
international constructs
internally based cyberthreat countermeasures
active cyberdefense
Government
Educational institutions
cyberweapons
Cyberspace
cyberdefenders
cyber domain
computer security
attribution agnostic cyberdefense constructs
attribution agnostic cyberdefense construct
anonymity protection
Active Defense
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Distributed anonymous authentication in heterogeneous networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:01pm
mobile users
telecommunication signalling
telecommunication security
signaling overheads
signaling delay
secure access authentication protocol
seamless roaming
radio access technologies
radio access networks
Protocols
next generation networks
adopted group signature algorithms
message authentication
identity verification
heterogeneous networks
Handover
group signature
group members
Educational institutions
distributed anonymous authentication protocol
DAA protocol
anonymous authentication
biblio
A fast human detection algorithm of video surveillance in emergencies
Submitted by BrandonB on Fri, 05/01/2015 - 8:37am
frame subtraction
video surveillance
target mask
single Guassian model
object detection
Moving Target
Image edge detection
IEEE Computer Society
human detection algorithm
Gaussian processes
Gaussian filter
background subtraction
fame subtraction
estimation
emergencies
Electronic mail
Educational institutions
edge tracking of head
edge detection
dilation
detection algorithms
Conferences
biblio
Provenance-aware security risk analysis for hosts and network flows
Submitted by BrandonB on Fri, 05/01/2015 - 7:29am
Computational modeling
computer network security
deep packet inspection
Educational institutions
high risk hosts
high risk network flows
Iterative methods
Monitoring
Ports (Computers)
provenance aware security risk analysis
risk analysis
risk management
risk score
security
biblio
Impacts of unreliable communication and regret matching based anti-jamming approach in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 6:49am
Jamming
wireless channels
unreliable wireless communication
smart power grids
Smart Grids
Smart Grid
regret matching
power system management
jamming attack
Algorithm design and analysis
Games
Educational institutions
DRM
demand response management
communication channel
cognitive radio
antijamming attack approach
biblio
Power grids vulnerability analysis based on combination of degree and betweenness
Submitted by BrandonB on Fri, 05/01/2015 - 6:24am
betweenness index
complex networks
degree index
Degree-betweenness
Educational institutions
fault simulation
Generators
IEEE 118 bus system
Indexes
power grid vulnerability analysis
power grids
power system faults
Power system protection
Vulnerability
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Reducing Mistrust in Agent-Human Negotiations
Submitted by BrandonB on Thu, 04/30/2015 - 12:37pm
Educational institutions
Intelligent systems
Joints
multi-agent systems
multiissue negotiation
face-to-face negotiation
Instruments
computational agent
Context
socially intelligent agent
Economics
online negotiation
software agents
Trusted Computing
agent-human negotiation
agent-human negotiations
online negotiation setting
socially intelligent agents
software agent
trusting individual
online interaction
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »