Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stochastic processes
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
stochastic methods-of-information security
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
heterogeneous supercomputer technologies
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
Cryptography
effective protection
DOZENHASH hashing algorithm
3D stochastic transformations
Hash functions
Stochastic processes
Three-dimensional displays
Compositionality
pseudorandom number generators
statistical testing
random number generation
Generators
NIST
pubcrawl
Resiliency
information security
biblio
Natural Language Processing Based Part of Speech Tagger using Hidden Markov Model
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Hidden markov-model
Viterbi algorithm
tagged sentences
supervised learning
stochastic taggers
rule based taggers
POS tagging
part-of-speech tagging
part of speech tagger
natural language processing applications
Malayalam language
Indian languages
Scalability
hidden Markov model
Hidden Markov models
language translation
tagging
natural language processing
Stochastic processes
Computational modeling
pubcrawl
Human behavior
Resiliency
Conferences
biblio
Complex of Description Models for Analysis and Control Group Behavior Based on Stochastic Cellular Automata with Memory and Systems of Differential Kinetic Equations
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
social sciences
possible transitions
preferences in social and economic systems
privacy
probability
pubcrawl
random link network
random processes
resilience
Resiliency
oscillating behaviors
sociological data
stochastic cellular automata
Stochastic processes
transition probability matrix
United States
United States president
user actions
variable memory
voters
differential kinetic equations
candidate C
cell memory
cellular automata
complex social systems
composability
control group behavior
delay time intervals
description models
differential equations
AD 2015 to 2016
electoral campaign
electoral processes
events prediction
interaction process
Kinetic theory
memory steps
Metrics
node types
numeric parameter
biblio
Trajectory-observers of timed stochastic discrete event systems: Applications to privacy analysis
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Discrete event system
privacy models and measurement
timed stochastic Petri net models
timed stochastic discrete event systems
stochastic petri nets
privacy analysis
Observers
Markov model
language-based opacity
k-step trajectory-observer
security
Stochastic processes
discrete event systems
Petri nets
privacy
Metrics
pubcrawl
data privacy
security of data
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
Submitted by grigby1 on Thu, 03/28/2019 - 3:15pm
defense strategies
signature based defense
tagging
suspicious information
signature-based antivirus systems
refinable attack investigation framework
realworld attack dataset
RAIN framework
optimal adversary
nonadversarial information tracking
multistage game
memory overhead
information flow passes
dynamic information flow tracking games
DIFT games
security
adversarial information flows
Resiliency
Cyber Attacks
firewalls
Stochastic processes
game theory
Scalability
pubcrawl
Monitoring
resilience
Games
Computational modeling
Analytical models
security of data
biblio
Service Oriented Resilience Strategy for Cloud Data Center
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
Measurement
system resilience
Stochastic processes
service oriented resilience
Servers
Scalability
Resilience strategy
resilience metric
resilience
quality of service
pubcrawl
Petri nets
Metrics
Resilient Security Architectures
maintenance engineering
IT architecture
hierarchical colored generalized stochastic petri net
fault tolerance
data centers
computer networks
computer centres
cloud data center
Cloud Computing
big data security
Big Data
Resiliency
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »