Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
A Secured OpenFlow-Based Software Defined Networking Using Dynamic Bayesian Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
Ryu controller
Transport Layer Security
stateful firewall
state information
secured OpenFlow-based software defined networking
programmable network protocol
main standard protocol
emulated network
dynamic bayesian network
distributed denial-of-service attack
denial-of-service attack
belief networks
Hidden Markov models
computer network security
Firewalls (computing)
Heuristic algorithms
OpenFlow
composability
pubcrawl
Resiliency
transport protocols
software defined networking
Bayes methods
Protocols
firewalls
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
Design of APT Attack Defense System Based on Dynamic Deception
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
dynamic IP address generation method
advanced persistent threat attack
APT attack defense system
APT defense system framework
deception defense process
defense APT attacks
defense system
DHCPv6
dynamic deception
APT attack
dynamic policy allocation mechanism
dynamic timing selection method
hybrid encryption communication mechanism
SM4
Socket
sockets
Viterbi algorithm
Cryptography
Firewalls (computing)
APT
advanced persistent threat
Dynamic scheduling
Metrics
Scalability
Heuristic algorithms
computer network security
Resiliency
resilience
Human behavior
pubcrawl
IP networks
Servers
encryption
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
biblio
A Distributed Fixed-Time Secondary Controller for DC Microgrids
Submitted by aekwall on Mon, 07/20/2020 - 10:31am
Electrical Engineering
Voltage control
time delays
Resiliency
Regulators
proportional current sharing
power distribution reliability
power distribution control
Microgrids
Heuristic algorithms
graph theory
fixed-time control approach
fixed-time control
fixed-time based secondary controller
pubcrawl
electric current control
droop control
distributed power generation
distributed fixed-time secondary controller
DC voltage deviation
DC microgrids
DC microgrid
DC distribution systems
current sharing
convergence
Control Theory and Resiliency
Communication networks
centralized secondary controller
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
outlier error values
highly structured adjacency matrix structures
increasing sparseness
learning (artificial intelligence)
Matrix decomposition
Metrics
network based attacks
network emulator
network security
network traffic
online learning algorithm
original adjacency matrix
Heuristic algorithms
pubcrawl
representative ecommerce traffic
Resiliency
resultant adjacency matrix
serious economic consequences
singular value decomposition
sparse autoencoder
Sparse matrices
telecommunication traffic
time 225.0 min
decomposition
autoencoder hyper-parameters
Bipartite graph
composability
Compositionality
Computer crime
computer network security
contiguous time intervals
cyber physical systems
Data mining
DDoS Attacks
anomaly detection algorithm
dynamic bipartite graph increments
dynamic graph
dynamic graph mining
dynamic network traffic
Dynamic Networks and Security
ecommerce websites
error distribution
GAAD
gaussian distribution
graph theory
biblio
A Novel Approach of Image Encryption Using Chaos and Dynamic DNA Sequence
Submitted by aekwall on Mon, 06/22/2020 - 11:28am
Human behavior
two dimension Sine-Henon alteration map
two dimension logistic map
reversible DNA operations
Resiliency
random processes
pubcrawl
pseudorandom sequences
privacy
Predictive Metrics
plain image pixel
Logistics
logistic map
image encryption scheme
Image coding
Cryptography
Histograms
Heuristic algorithms
encryption of image
encryption
encoding
dynamic DNA sequence
DNA sequence
DNA operations cipher image
DNA cryptography
DNA converted pixel
DNA
distorted image
Different types of attacks and Statistical Analysis
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »