Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time-frequency Analysis
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Fri, 05/01/2015 - 8:39am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Submitted by BrandonB on Fri, 05/01/2015 - 8:38am
localized periodicity analysis
wavelet multiresolution analysis method
wavelet analysis
traffic anomaly
Time-frequency Analysis
RoQ attack
reduction of quality
network traffic
network security
Multiresolution analysis
misuse detection
Algorithm design and analysis
inhibit normal TCP flows
detection systems
detection algorithms
detection algorithm
denial of service attack
Correlation
computer network security
Computer crime
autocorrelation analysis
Anomaly Detection
biblio
Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis
Submitted by BrandonB on Fri, 05/01/2015 - 8:37am
Discrete Fourier transforms
Grippers
network security
persistent activity
slow-paced attack
Spectral analysis
spectrum analysis
time series
Time series analysis
time-domain analysis
Time-frequency Analysis
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
biblio
Secret key generation in correlated multi-dimensional Gaussian channels
Submitted by BrandonB on Fri, 05/01/2015 - 8:35am
secret key generation
wireless networks
Wireless communication
wireless channels
wireless channel reciprocity
wide-sense stationary wireless channels
Time-frequency Analysis
time-domain analysis
time selectivity
time domains
telecommunication security
spatial domains
spatial correlation
signal-to-noise ratio
Signal to noise ratio
security
analytical framework
radio networks
public key cryptography
public channel
multiple antenna eavesdroppers
intrinsic secrecy content
Gaussian channels
frequency-domain analysis
frequency domains
Covariance matrices
correlated multidimensional Gaussian channels
confidential communications
Communication system security
asymptotic analysis
antenna arrays
biblio
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks
Submitted by BrandonB on Fri, 05/01/2015 - 8:20am
Ports (Computers)
wavelet transforms
wavelet transform
two-dimensional image
traffic signal
time-frequency representation technique
Time-frequency Analysis
telecommunication traffic
signal processing method
S-transform
Probes
probe attacks
accurate attack signatures
Otsu method
Intrusion Detection Systems
internet
image processing method
IDS
frequency components
DoS attacks
denial-of-service detection
computer network security
Computer crime
biblio
A characterization of uncoordinated frequency hopping for wireless secrecy
Submitted by BrandonB on Fri, 05/01/2015 - 8:16am
spread spectrum communication
wireless transmissions
wireless secrecy
Wireless communication
uncoordinated frequency hopping characterization
Time-frequency Analysis
Throughput
telecommunication security
spread spectrum scheme
communication secrecy level
security
secret-key exchange
radio transmitters
radio receivers
Jamming
Interference
Cryptography
biblio
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion
Submitted by BrandonB on Fri, 05/01/2015 - 8:15am
frequency estimation
window size
timestamp identification
Time-frequency Analysis
STFT
signal-to-noise ratio
Signal to noise ratio
Signal resolution
short-time Fourier transform
short recording durations
reference data
MMSE
minimum mean squared error
mean square error methods
maximum correlation coefficient
frequency resolution problems
audio authentication
frequency estimates
Fourier transforms
extracted ENF signal
estimation
ENF criterion
electric network frequency criterion
Electric network frequency (ENF)
dynamic matching
correlation methods
Correlation
autocorrection process
audio timestamp identification
audio recording
audio forensics
biblio
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
Submitted by BrandonB on Fri, 05/01/2015 - 8:14am
replay attacks
financial transaction
human auditory system
information fusion
learning (artificial intelligence)
Linear discriminant analysis
machine learning technique linear discriminant analysis
nonstationary signal time-frequency representation
otoacoustic emissions
feature extraction
Robust Biometric Modality
sensor fusion
signal representation
TEOAE
Time-frequency Analysis
transient evoked otoacoustic emission
wavelet analysis
Access Control
falsification attacks
earprint
Data Security
data privacy
cochlea
click stimulus
biometrics (access control)
biometrics
biometric fusion
authorisation
Auditory system
advanced spoofing techniques
advance forgery methods
advanced forgery techniques
acoustic response
biblio
Con-Resistant Trust for Improved Reliability in a Smart-Grid Special Protection System
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
power system reliability
variance statistical model
untrustworthy protection system
trust assessments
Time-frequency Analysis
statistical analysis
special protection systems
special protection system
smart power grids
Smart Grids
Smart Grid
situational awareness
Resistance
reputation-based trust
Con-resistant trust
Power system protection
Peer-to-peer computing
modern information technology
malicious protection system
malfunctioning protection system
Load modeling
improved reliability
Government
Generators
frequency readings
critical infrastructure
con-resistant trust mechanism
« first
‹ previous
1
2
3
4
5
6
7