Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Noise measurement
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
biblio
Neural Network Model for False Data Detection in Power System State Estimation
Submitted by grigby1 on Mon, 12/30/2019 - 2:21pm
Power systems state estimation
perceptron model
perceptron models
perceptrons
power engineering computing
Power measurement
power system measurement
Power system measurements
power system state estimation
outlier detection scheme
principal component analysis
pubcrawl
resilience
Resiliency
trained network
Training
training sets
Voltage measurement
feature extraction
13-bus IEEE test system
Artificial Neural Networks
composability
correlated data sets
cyber physical systems
Data models
data preprocessing technique
False Data Injection
False Data Detection
historical data
Human behavior
Linear programming
Measurement false data
Multi-layer perceptron
neural network model
Noise measurement
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
SDN
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
PI controllers
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
GENI testbed
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
Attack Analyzer
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
biblio
Improving Our Understanding of Measured Jitter (in HAMR)
Submitted by aekwall on Mon, 09/30/2019 - 10:08am
magnetic recording
write-field rise time
write current
WC overshoot amplitude
transition jitter
Signal to noise ratio
root causes
remanence
pubcrawl
Optical wavelength conversion
Noise measurement
micromagnetics
micromagnetic simulations
Measurement
measured jitter
Magnetic Remanence
magnetic heads
linear disk velocity
Jitter
Heat-assisted magnetic recording (HAMR)
Heat-assisted magnetic recording
down-track reader resolution
data analysis scheme
data analysis
cross-track direction
composability
cyber physical systems
Internet of Things
Compositionality
Resiliency
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Data-Driven Optimization for Utility Providers with Differential Privacy of Users' Energy Profile
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Smart Grid Consumeer Privacy
power generation
power generation cost reduction
power generation economics
power system simulation
privacy
privacy risks
pubcrawl
Resiliency
simulated energy consumption data
policy-based governance
smart grid consumer privacy
Smart Grids
smart meters
smart power grids
users demand distribution
users energy profile differential privacy
utility companys real data analysis
utility provider
energy consumption
data privacy
data- driven cost minimization
data-driven optimization
differential privacy
differential private noises
digitally enabled smart grid
distributed differential privacy techniques
electricity grid
data analysis
espionage meters
fine-grained energy consumption data
historical users differentially private data
Human behavior
Metrics
minimisation
Noise measurement
noisy data collection
biblio
A Cross Correlation Approach for Breaking of Text CAPTCHA
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
challenge-response test
text CAPTCHA
Segmentation
Optical character recognition software
online web service providers
OCR
Noise measurement
image denoising
image classification
distorted text
cross correlation approach
character recognition
security of data
captcha images
CAPTCHA
image segmentation
captchas
Correlation
web services
standards
composability
pubcrawl
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »