Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
A Practical Evaluation of Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke time series
time series
time 5 min
time 30 min
time 2.5 min
time 10 min
time 1 min
temporal data order
sliding window
sessions
pubcrawl
Metrics
Measurement
Human behavior
keystroke analysis
Keyboards
integrated circuits
Human Factors
authentication
behavioral biometric
biometrics (access control)
continuous user authentication
Data collection
free-text keystroke dynamics
Heuristic algorithms
biblio
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
Resiliency
parallel processing
partition decision trees
partitioning
Partitioning algorithms
partitioning-based packet classification algorithms
pattern classification
pubcrawl
resilience
packet classification accelerator chips
Scalability
search table
security
software-based packet classification algorithms
T-CAM
telecommunication computing
telecommunication traffic
ternary content addressable memory
high scalable packet classification algorithm
cache-aware table structure
Classification algorithms
computer network security
Decision trees
general hardware architectures
hardware-based solutions
Heuristic algorithms
high performance packet classification algorithm
Buildings
high-performance systems
integrated inter- and intra-table search
Metrics
Multicore Computing
multicore computing security
multicore multithreaded processors
network security systems
packet classification
biblio
Self-learning method for DDoS detection model in cloud computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
Heuristic algorithms
self-learning method
self-learning
Resiliency
relearning pool
relearning
pubcrawl
Netflow protocol
minimisation
Metrics
machine learning
legitimate user possibility reduction
learning (artificial intelligence)
Human behavior
Adaptation models
false detection minimization
distributed denial-of-service attack
DDoS detection model
DDoS attack detection
Data mining
computer network security
Computer crime
Computational modeling
composability
cloud virtual networks
Cloud Computing
Classification algorithms
biblio
Mathematical cryptanalysis of \#x201C;personalized information encryption using ECG signals with chaotic functions \#x201D;
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Henon map
text encryption
text analysis
Secret key
Resiliency
pubcrawl
Physics
personalized information encryption
Optics
numerical simulation
Metrics
mathematical cryptanalysis
image data encryption
Heuristic algorithms
Henon mapping
bifurcation
Electrocardiography
electrocardiogram
ECG signals
data encryption algorithm
cryptosystem
Cryptography
cryptanalysis
composability
Chosen-plaintext attack
chaotic system
chaotic functions
chaotic cryptography
chaos
biblio
An Investigation on Tree-Based Tags Anti-collision Algorithms in RFID
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Algorithm design and analysis
Anti-collision algorithm
Deterministic algorithm
Electronic tags
Heuristic algorithms
Human behavior
Human Factors
pubcrawl
radio frequency identification
radiofrequency identification
Resiliency
RFID
RFIDs
Satellite broadcasting
security
Time complexity
biblio
Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
fake key
un-detectability
telecommunication security
telecommunication channels
Servers
Scalability
Resiliency
pubcrawl
Protocols
message authentication
Heuristic algorithms
hashed message authentication code
generated un-detectability covert channel algorithm
advanced encryption standard
encryption
dynamically
dynamic secure communication
cryptography algorithms
Cryptography
covert channels
covert channel
confidentiality
Compositionality
authentication
Algorithm
biblio
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
pubcrawl
vTPM DTE
virtual Trusted Platform Module (vTPM)
virtual trusted platform module
virtual TPM dynamic trust extension
virtual machines
trusted platform modules
Trusted Platform Module (TPM)
Trusted Computing
Trust Extension
time token
Servers
Resiliency
real-time systems
public key cryptography
attestation data
pTPM
physical TPM
performance measurements
IK certificate
identity key certificate
Heuristic algorithms
frequent migrations
Elliptic curve cryptography
Computers
composability
authorisation
authentication server
authentication
biblio
How to represent IPv6 forwarding tables on IPv4 or MPLS dataplanes
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
IPv6 FIB
telecommunication network routing
Silicon
Resiliency
pubcrawl
parallel processing
multiprotocol label switching
MPLS dataplanes
Metrics
Memory management
memory footprint
lookup time
IPv6 forwarding tables
Abstraction Layer
IPv4
IP networks
Internet routing ecosystem
internet
Human behavior
Heuristic algorithms
Conferences
collaboration
clean slate architectures
clean slate
classification width
biblio
Robust-to-dynamics linear programming
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
pubcrawl170110
upper bounds
uncertainty
structural properties
semidefinite programming based algorithm
semidefinite programming
Robustness
robust-to-dynamics optimization
robust-to-dynamics linear programming
robust optimization problems
Robust optimization
RDO
Asymptotic stability
polynomial time
optimization
Nonlinear dynamical systems
mathematical program
linear system
Linear programming
linear dynamics
Heuristic algorithms
Facsimile
Dynamical Systems
dynamical system
biblio
Symplectic integration for optimal ergodic control
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
nonlinear dynamics
trajectory optimization
trajectory control
time-averaged trajectory
symplectic integration
statistical representation
statistical analysis
standard first-order discretization techniques
spatial distribution
search algorithm
pubcrawl170110
Path Planning
optimal search trajectory
optimal ergodic control
optimal control
autonomous active exploration
nonlinear control systems
mobile robots
Measurement
Linear programming
iterative optimal control algorithm
Iterative methods
Heuristic algorithms
graphical models
Distribution functions
discrete-time iterative trajectory optimization approach
discrete time systems
continuous-time trajectory optimization algorithm
continuous time systems
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »