Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Critical Aspects Pertaining Security of IoT Application Level Software Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
Vulnerability
standards
Software systems
software security
security of data
security
Resiliency
resilience
pubcrawl
Protocols
privacy issues
policy-based governance
application level software systems
middleware
IoT devices
IoT
Internet of Things security
Internet of Things
Insecure Software/Firmware
insecure software
Insecure Interfaces
data privacy
Constrained Application Protocol
composability
CoAP
biblio
On Integrating Knowledge Graph Embedding into SPARQL Query Processing
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Approximation algorithms
Time factors
SPARQL query processing
research problems
query languages
query language
NN search algorithm
Nearest Neighbor Searching
knowledge graph embedding
KGE
Covariance matrices
search problems
nearest neighbor search
query processing
graph theory
nearest neighbour methods
Measurement
optimisation
Metrics
standards
Mathematical model
pubcrawl
biblio
New TSBuilder: Shifting towards Cognition
Submitted by aekwall on Mon, 05/18/2020 - 10:56am
supervised machine learning
cognition
artificial thinking
human thinking
multilayer Rosenblatt perceptron
natural language texts
new TSBuilder
rigid categorization
rigidity
Biological neural networks
term length
term system builder
term system building
term system construction
Text Mining
TSBuilder
word terms identification
Scalability
neural network
Data mining
natural language processing
text analysis
machine learning
Decision Making
Neurons
standards
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Task Analysis
biblio
Correction of Spaces in Persian Sentences for Tokenization
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
social media services
half-spaces
natural language tasks
normalization
online text
Persian
Persian language
Persian sentences
preprocessing tools
full-spaces
space
textual data
textual preprocessing
user comments
Web 2.0
word identification
word vocabulary
Scalability
exponential growth
automatic analysis
Tokenization
natural language processing
text analysis
Decision Making
tools
internet
standards
social networking (online)
Computational modeling
pubcrawl
Human behavior
Resiliency
Task Analysis
biblio
A Benchmark Suite of Hardware Trojans for On-Chip Networks
Submitted by grigby1 on Fri, 05/15/2020 - 12:45pm
Information Leakage
Trojan horses
system-on-chip
standards
side channel analysis
security
Routing
performance degradation
on-chip networks
NoC
network-on-chip
multiprocessing systems
multicore systems
manycore systems
invasive software
network on chip security
HT defense methods
Hardware Trojans
hardware trojan
Hardware
Functional testing
Cryptography
benchmarks
Benchmark testing
benchmark suite
Metrics
Resiliency
resilience
Scalability
biblio
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
OPC UA
unified data model
unified communication architecture
standards
Security Requirements Modeling
security requirement communication
security of data
security
SCADA Security
Resiliency
resilience
pubcrawl
production engineering computing
Production
open platform communications
OPC UA server
composability
object oriented security
Object oriented modeling
Metrics
machine-readable data model
Internet of Things
Industries
industrial IoT security requirements
industrial infrastructures
Industrial Control Systems
industrial control system security
industrial control
Germany
fourth industrial revolution
Data models
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
machine learning models
privacy models and measurement
Sophisticated Attacks
PixelDP
norm-bounded attacks
machine-learning
ImageNet
Google Inception network
defense
Deep-learning
cryptographically-inspired privacy formalism
certified robustness
certified defense
Adversarial-Examples
adversarial examples
Cryptography
deep neural networks
differential privacy
Predictive models
Measurement
Mathematical model
Databases
neural nets
standards
Robustness
Metrics
pubcrawl
learning (artificial intelligence)
security
data privacy
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »