Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Feature-Weighted Fuzzy K-Modes Clustering
Submitted by aekwall on Mon, 01/27/2020 - 9:25am
pubcrawl
composability
Swarm Intelligence
clustering
Entropy
Compositionality
Categorical data
Feature weights
Feature-weighted FKM (FW-FKM)
Fuzzy k-modes (FKM)
biblio
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Training
TCP congestion-control mechanism
support vector machine based machine learning model
PSD based entropy
PSD
power spectral density
malicious LDoS traffic
Low-rate DDoS
LDoS attacks
Entropy.
decision algorithm
complex low-rate DoS attack detection
communication complexity
Predictive Metrics
decision theory
Entropy
Computer crime
SVM
detection algorithms
machine learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
distributed denial of service attack
telecommunication traffic
intrusion detection system
DDoS
computer network security
biblio
Efficient Video Encryption Using Lightweight Cryptography Algorithm
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
Resiliency
lightweight cryptography algorithm
lightweight encryption methods
low computation cost
low powered battery operated devices
natural redundancy
neighbouring pixels
pubcrawl
resilience
KHAZAD cipher
Secure Force (SF)
secure IoT
Secure IoT (SIT)
small battery operated devices
spatio-temporal correlation
Spatiotemporal phenomena
video data
video signal processing
efficient encryption
Ciphers
composability
conventional encryption methods
Correlation
correlation methods
Cryptography
Cyber Physical System
cyber physical systems
Cipher
efficient video encryption
encryption
encryption algorithm
Entropy
highly complex encryption process
Histograms
Internet of Things
IoT environment
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 9:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
Edmund: Entropy Based Attack Detection and Mitigation Engine Using Netflow Data
Submitted by aekwall on Wed, 12/18/2019 - 1:23pm
Human behavior
pubcrawl
composability
Metrics
Entropy
network attacks
resilience
Attack Detection and Mitigation
Malicious Flows
DDoS attack mitigation
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by aekwall on Mon, 12/09/2019 - 11:22am
low-overhead trust computing algorithms
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
global trust calculation
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
Entropy
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
security of data
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
Towards Gaze-Based Quantification of the Security of Graphical Authentication Schemes
Submitted by grigby1 on Tue, 11/12/2019 - 3:26pm
Entropy
eye-tracking
graphical passwords
graphical user authentication
Metrics
password strength estimation
predictive security metrics
pubcrawl
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 3:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »