Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Adversarial Machine Learning Attack on Modulation Classification
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
modulation
Task Analysis
Support vector machines
Signal to noise ratio
security of data
Scalability
Robustness
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Modulation classification
Adversarial Machine Learning
ML-based modulation classifiers
ML-based modulation classification methods
ML models
Mathematical model
learning (artificial intelligence)
Human behavior
Deterrence
cognitive self-driving networks
Carlini & Wagner attack
adversarial ML examples
adversarial machine learning attack
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 12:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 12:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 10:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
Conditional Generative Adversarial Network on Semi-supervised Learning Task
Submitted by grigby1 on Fri, 06/12/2020 - 11:21am
Mathematical model
Tensile stress
supervised learning
semisupervised learning method
Semisupervised learning
semi-supervised
Scalability
Resiliency
resilience
pubcrawl
neural nets
MNIST dataset
Metrics
abundant unlabeled data
image classification
Generators
generative adversarial networks
generative adversarial network
Generative Adversarial Learning
Gallium nitride
deep neural networks
Data models
conditional generative adversarial network
conditional GAN model
conditional
biblio
Game-Theoretic Planning to Counter DDoS in NEMESIS
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
Human Factors
security and privacy
packet-level simulation
network maneuvers
NEMESIS
game-theoretic planning
game theoretic optimal courses of action
distributed denial-of-service attacks
COA
analytical wargaming
game theoretic security
Predictive Metrics
Computer crime
Games
Mathematical model
Planning
Analytical models
pubcrawl
game theory
Servers
Scalability
distributed denial of service attacks
DDoS
computer network security
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »