Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Fast HEVC Selective Encryption Scheme Based on Improved CABAC Coding Algorithm
Submitted by grigby1 on Wed, 05/05/2021 - 11:40am
Interference
syntax elements
Syntactics
Selective Encryption
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
collaboration
Human Factors
Human behavior
high efficiency video coding
entropy coding
Entropy
encryption
encoding
context-based adaptive binary arithmetic coding
biblio
Quantifying Security and Performance of Physical Unclonable Functions
Submitted by grigby1 on Tue, 04/27/2021 - 3:00pm
Cryptography
Entropy
Hardware
Hashing Function
Integrated circuit modeling
Measurement
Metrics
Object recognition
Performance
Physical Unclonable Function
Physical Uncloneable Function
pubcrawl
security
Security Metrics
similarity
tools
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 3:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
Measurement
quantitative analysis
information theoretic security metric
information theoretic point of view
fine-grained tuning
Abstracts
Random variables
information theoretic security
wireless communication systems
security performance
Security Properties
radio networks
Scalability
Entropy
uncertainty
Metrics
Wireless communication
policy-based governance
pubcrawl
Human behavior
Resiliency
security
telecommunication security
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
An Empirical Analysis on the Usability and Security of Passwords
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
empirical analysis
phonemes
passwords
password-based authentication systems
password security
password creation strategies
Information Reuse and Security
Guidelines
Compositionality
password
security
security experts
message authentication
usability
Entropy
authentication
NIST
pubcrawl
Resiliency
authorisation
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 3:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
Tracing and detection of ICS Anomalies Based on Causality Mutations
Submitted by grigby1 on Tue, 03/30/2021 - 10:51am
Entropy
traceability of anomaly
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
Microwave integrated circuits
information entropy
industrial control system
industrial control physics
industrial control
ICS Anomaly Detection
ICS anomalies
Anomaly Detection
Data mining
Correlation
control engineering computing
comparison algorithm
causality mutations
causality modeling
causality mining algorithm
causal network
causal modeling algorithm
causal anomaly detection
anomaly source traceable
anomaly node
anomaly location strategy
anomaly detection algorithm
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »