Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vectors
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
Submitted by aekwall on Mon, 03/22/2021 - 12:13pm
multiplication temporal complexity
Vectors
vector-module method
vector-modular method
temporal complexity
Scalability
Resiliency
public key cryptography
pubcrawl
asymmetric cryptographic algorithms
multiplication
modular exponentiation
information flow encryption
information flow decryption
exponentiation
ElGamal cryptosystem
Elgamal cryptoalgorithm
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 12:10pm
neural net architecture
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
frequency 60.0 MHz
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
Pipelines
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
field programmable gate arrays
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
biblio
Multi-Robot System Based on Swarm Intelligence for Optimal Solution Search
Submitted by aekwall on Mon, 12/14/2020 - 11:37am
DC motors
temperature generating sources
system structure
Search Space
radio-electro-magnetic devices
radiation sources
optimal solution search
operation system
neurocontrollers
multirobot system
Multi-Robot System
gradient vectors
gradient vector
Gradient Field
pubcrawl
DC motor rotational speed
angular velocity control
Artificial Neural Networks
Systems engineering and theory
gradient methods
Compositionality
sensors
Vectors
particle swarm optimization
Swarm Intelligence
multi-robot systems
mobile robots
composability
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 11:17am
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
1
2
3
4
5
6
7
8
9
next ›
last »