Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Collaborative Filtering Algorithm Based on Trust and Information Entropy
Submitted by grigby1 on Mon, 10/05/2020 - 1:10pm
Prediction algorithms
weighted information entropy
trust similarity
trust relationship
trust
time decay function
time decay
security
Scalability
robots
Resiliency
resilience
recommender systems
recommendation system
pubcrawl
collaboration
Pearson similarity
information entropy theory
information entropy
human trust
Human Factors
human computer interaction
Human behavior
filtering algorithms
Filtering
Entropy
computer theory
collaborative filtering algorithm
collaborative filtering
biblio
Optically Interrogated Unique Object with Simulation Attack Prevention
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
analogue measurement
confinement
UNO
unique photo-luminescence properties
unique object
simulation attacks
simulation attack protection
simulation attack prevention
simulation attack
semiconductor quantum dots
Quantum dots
Quantum Confinement UNO responds
physical object
photoluminescence
photoconductive cells
Nonlinear optics
security of data
absorption
light sources
Computer simulation
Adaptive optics
Cameras
resilience
quantum computing
cyber-physical systems
Entropy
privacy
Data protection
composability
pubcrawl
Resiliency
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
An Approach for Distributing Sensitive Values in k-Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 4:35pm
microdata table
simple distribution of sensitive values
simple distribution
sensitive attributes
SDSV
Resiliency
resilience
quasiidentifier group
pubcrawl
privacy guarantee
anonymity
Metrics
low sensitive values
k-anonymity
Human behavior
high-sensitive values
high-sensitive value
Entropy
data privacy
composability
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
Real Time Android Ransomware Detection by Analyzed Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
program diagnostics
android encryption
static method
realtime variant ransomware detection
realtime unknown ransomware detection
realtime new ransomware detection
real-time detection
real-time Android ransomware detection
PC environment
New/Variant/Unknown Ransomware
dynamic method
analyzed Android applications
Metrics
Android (operating system)
android
Monitoring
static analysis
Entropy
smart phones
Ransomware
pubcrawl
Human behavior
Resiliency
real-time systems
mobile computing
invasive software
encryption
Cryptography
Scalability
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »