Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information analysis
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
information-theoretic security
wiretap channels
telecommunication security
secure rates
secrecy capacity
Scalability
Resiliency
Random variables
pubcrawl
policy-based governance
Mutual information
Metrics
Jamming
Interference
channel state information
information-spectrum methods
information theory
information theoretic security
information security
Information analysis
Human behavior
feedback
fading channels
Fading
ergodic fading channels
Cryptography
complex communication scenarios
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
Dark web forum correlation analysis research
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
law enforcement
visualization
visual dark web forum post association analysis system
TOR system
Tor
threat information
Servers
Routing
pubcrawl
police data processing
network survey techniques
mainstream dark network communication system
law enforcement officers
Browsers
internet
Information analysis
Human Factors
Human behavior
Histograms
dark web market
dark web forum correlation analysis research
Dark web forum
dark web
Correlation analysis
Computer crime
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
biblio
The using of bibliometric analysis to classify trends and future directions on \#x201C;smart farm \#x201D;
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
Scopus online database
Policy-Governed Secure Collaboration
product lifecycle management
Productivity
pubcrawl
Resiliency
Scalability
science mapping
Science of Security
Metrics
security
smart farm
Soil
soil carbon emission
Supply Chain
VOSviewer tool
Web of Science
WOS database
food production
bibliometric analysis
Carbon dioxide
climate change
collaboration
composability
farm areas
farming
farming activity
Agriculture
food productivity
food safety
Human behavior
Human Factors
Information analysis
knowledge management
Meteorology
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
LoyalTracker: Visualizing Loyalty Dynamics in Search Engines
Submitted by BrandonB on Tue, 05/05/2015 - 1:26pm
loyalty dynamics visualization
word cloud
visual analytics system
visual analytics
user loyalty tracking
user log data
Time-series visualization
text visualization
text analysis
switching behavior
stacked graphs
Search methods
search engines
search engine providers
Behavioral science
LoyalTracker
log data visualization
interactive visualization technique
Information analysis
Human Factors
flow view
flow metaphor
density map
defection behavior
Data visualization
data visualisation
data analysis
biblio
User identification through command history analysis
Submitted by BrandonB on Mon, 05/04/2015 - 2:35pm
learning (artificial intelligence)
user profile corpus
user identification
user corpora
user configuration
Unix user
Unix
standard algorithm
Semantics
Schonlau variant
Schonlau masquerading corpus
Schonlau corpus
natural language processing
natural language authorship attribution literature
Accuracy
Information analysis
History
feature set
feature extraction
Entropy
editor war
Decision trees
computer science
command-line history
command-line behavior
command history analysis
Cal Poly command history corpus
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing