Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Discrete cuttlefish optimization algorithm to solve the travelling salesman problem
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
pubcrawl170110
Urban areas
TSPLib library
travelling salesman problems
travelling salesman problem
the cuttlefish optimization algorithm
Statistics
Sociology
Silicon
reflection
combinatorial optimization
optimization
metaheuristic
Mathematical model
local research
global research
discrete problems
discrete cuttlefish optimization algorithm
discrete combinatorial optimization problems
biblio
A mixed discrete-continuous optimization scheme for Cyber-Physical System architecture exploration
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
discrete systems
sizing routine
pubcrawl170110
optimization time
optimization
optimisation
mixed discrete continuous optimization scheme
Mathematical model
magnitude reduction
Libraries
Engines
aircraft control
discrete space
discrete optimization routine
discrete architecture selection engine
cyber-physical system architecture exploration
CPS
contracts
continuous sizing engine
computer architecture
Atmospheric modeling
aircraft environmental control system
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
Digital forensic framework using feedback and case history keeper
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Digital Forensics
system monitoring
pubcrawl170109
Mathematical model
history lookup facility
History
forensic models
feedback
Evidence
Adaptation models
digital forensic framework
digital crime investigation
digital crime
cyber crime investigation
Computers
Computer crime
Computational modeling
case history keeper
biblio
Forecasting severity of software vulnerability using grey model GM(1,1)
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Predictive models
Vulnerability
software vulnerability forecasting severity
software security level
software security
software risk level
software reliability
Software
severity
security of data
security
pubcrawl170107
grey model
prediction
Measurement
Mathematical model
grey theory
grey systems
grey system theory
GM(1
forecasting theory
forecasting
Data models
biblio
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
operating systems (computers)
Substations
smart power grids
Smart Grid
Security Risk Management
security
SCADA Security
risk management
pubcrawl170108
pubcrawl170107
power system management
power system control
power grids
power engineering computing
Communication equipment
off-the-shelf vulnerable operating systems
noncooperative game theory
Non-cooperative Game Theory
Nash Equilibrium
Mathematical model
interdependent ICT
Games
game-theoretical model
game theory
electrical infrastructures
cyber-physical system
communication infrastructure
biblio
Resilient cumulant game control for cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
linear Markovian system
Trajectory
security vulnerability
security of data
quadratic cost function optimization
pubcrawl170107
optimisation
Nash game
Nash Equilibrium
Mathematical model
Markov processes
control feedback gain variation
linear hybrid stochastic system
HJB equation
Hamilton-Jacobi-Bellman equation
Games
game theory
full-state feedback
cyber-physical systems
cyber-physical system
cumulant game control resiliency
Cost function
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 11:52am
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"An improved speech enhancement approach based on combination of compressed sensing and Kalman filter"
Submitted by grigby1 on Tue, 02/21/2017 - 11:33am
noisy speech signal reconstruction
Wiener filters
Wiener filter
speech enhancement techniques
speech enhancement
Speech
Spectral Subtraction
signal subspace
signal reconstruction
pubcrawl170104
objective measures
compressed sensing
Noise measurement
MMSE
Mathematical model
least mean squares methods
Kalman filters
Kalman filter
improved speech enhancement approach
CoSaMP algorithm
compressive sampling matching pursuit
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
next ›
last »