Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vectors
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Random Manhattan Indexing
Submitted by BrandonB on Tue, 05/05/2015 - 1:29pm
Mathematical model
Vectors
vector space model
text analysis
sparse Cauchy random projections
RMI
retrieval models
random projection
random Manhattan indexing
natural language text
Computational modeling
Manhattan distance
L1 normed VSM
indexing
Equations
dimensionality reduction technique
dimensionality reduction
data reduction
Context
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Detecting, locating, amp; quantifying false data injections utilizing grid topology through optimized D-FACTS device placement
Submitted by BrandonB on Tue, 05/05/2015 - 12:32pm
power grids
Voltage control
Vectors
Transmission line measurements
topology perturbation
Topology
state estimation
situational awareness method
power system state estimation
power system security
AC state estimation
Perturbation methods
optimized D-FACTS device placement
Jacobian matrices
grid topology
flexible AC transmission systems
false data injection attack vector
Distributed Flexible AC Transmission Systems
distributed flexible AC transmission system devices
bad data detection scheme
biblio
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
attack graph analysis
attack graphs
attack surface
authentication
graph theory
information security
Measurement
security frameworks
security of data
Servers
Software
Vectors
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
security
XSS vector testing
XSS
Web browser attack surface
web applications
Web
Vectors
testing
systematic security regression testing
security of data
browser
regression analysis
Regression
Payloads
online front-ends
Mobile communication
HTML
cross-site scripting
Browsers
biblio
Enhanced browser defense for reflected Cross-Site Scripting
Submitted by BrandonB on Tue, 05/05/2015 - 10:42am
security
XSS-Me
XSS attack
XSS
Web sites
Web page
Web browser
vulnerable Web application
Vectors
unfiltered reflection
testing
special characters
sophisticated attack
sensitive information
security of data
Attack vectors
search engines
reflected XSS vulnerability
reflected cross-site scripting
open source Mozilla Firefox security extension
online front-ends
malicious script
malicious input
Information filters
HTML
filter
enhanced browser defense
defense
client-side solution
Browsers
biblio
Energy Efficient Network Deployment With Cell DTX
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
maximum achievable energy saving
Vectors
traffic variation
traffic profile
telecommunication power management
sleep mode operations
quality of service
Power demand
Planning
network deployment
base station
Load modeling
Interference
energy efficient network deployment
Energy Efficiency
energy consumption
cellular radio
cell load
cell DTX
cell discontinuous transmission
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 8:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »