Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
biblio
Physical-Layer Security of Visible Light Communications with Jamming
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
PLS scheme
Wireless communication
Visual Light Communications Security
visible light communications
visible light communication
uniform distribution
truncated generalized normal distribution
telecommunication security
signal processing
security
secrecy rate
Scalability
Resiliency
Radio frequency
pubcrawl
Entropy
physical-layer security
Photodetectors
normal distribution
multiple eavesdroppers
Metrics
light emitting diodes
jamming LED
Jamming
input signal
indoor VLC system
indoor communication
free-space optical communication
Exponential distribution
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Detection and Mitigation of DDoS Attacks Using Conditional Entropy in Software-defined Networking
Submitted by aekwall on Mon, 06/29/2020 - 11:47am
DDoS attack mitigation
SDN security
network revolution
mitigation
lightweight approach
DDoS attack detection
control logic
conditional entropy
centralized management unit
centralized control
basic packet forwarding equipment
network resources
centralised control
DDoS detection
computer network security
distributed denial of service attacks
telecommunication control
SDN
software-defined networking
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
DDoS
biblio
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance
Submitted by aekwall on Mon, 06/29/2020 - 11:47am
abnormal traffic
DDoS attack detection
simulated DDoS attacks
Shannon entropy
Mahalanobis distance
KOAD
Internet enabled services
Internet based services
hybrid method
Flash Event
FE traffic
DDoS attack simulation
analogous flash events
computer network security
Entropy
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
telecommunication traffic
IP networks
distributed denial of service attacks
DDoS
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »