Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
information security
biblio
Copyright Protection for Online Text Information : Using Watermarking and Cryptography
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
Cryptography
information security
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
internet
composability
security risks
Semantics
Syntactics
HTML
Web pages
text analysis
Semantic
Watermarking
copyright
Internet technologies
Information Assurance
digital watermarking
hypertext markup language
intellectual copyright protection
online content copyright protection
online information sharing
online text information
Syntactic
text documents
visible watermarking techniques
web page watermarking
Web text
web-based text
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
tools
CPS
cyber-physical systems
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
computer network security
Heuristic algorithms
Scalability
internet
Entropy
information security
composability
Measurement
Cybersecurity
cyberattack
system vulnerabilities
situational awareness
Spatiotemporal phenomena
markov chain
cyber threat
cyberattack resilience
cybersecurity capabilities
cybersecurity risks
data quality
entropy-centric algorithm
graphs
Information Assurance
information-centric cyberattack analysis
intelligence exploitation
networks
spatiotemporal dynamic graphs
spatiotemporal networks
statistically-characterized dynamic graphs
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
Cryptography
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
computational complexity
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
central server
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
phase encoding framework
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
insider threat
security of data
information security
Monitoring
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Information systems
computer security
Metrics
computer networks
computer science education
model
detection
Systems engineering and theory
active defense model
Electronic equipment
Fellows
hierarchy-mapping based insider threats model
insider threat sense
insider threats detection
SEnSE
Systems engineering education
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
security of data
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
nearest neighbour methods
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
image authenticity
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
security of data
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
Communication system security
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
information-theoretic security
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
anonymous system timing analysis
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
channel state information
complex communication scenarios
Cryptography
ergodic fading channels
Fading
fading channels
feedback
Human behavior
Information analysis
information security
information theoretic security
information theory
information-spectrum methods
information-theoretic security
Interference
Jamming
Metrics
Mutual information
policy-based governance
pubcrawl
Random variables
Resiliency
Scalability
secrecy capacity
secure rates
telecommunication security
wiretap channels
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Metrics
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
secure communication protocol
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
message protection
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
telecommunication security
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
policy-based governance
wireless sensor networks
Cryptography
Metrics
information theory
information security
computer networks
error correction codes
network coding
error correction
Upper bound
multicast communication
information theoretic security
cryptographic approach
cryptographic signature
Information rates
information-theoretic approach
network coding security
network error correction
Pollution
pollution attack
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
Scalability
Cryptography
Protocols
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
information theory
quantum computing
information security
digital signatures
cryptosystems
Computer graphics
information theoretic security
long-term security
power system security
trusted initializer model
unconditionally secure schemes
1
2
3
4
5
6
7
8
9
…
next ›
last »