Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Artificial Neural Network Based IDS
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
nonmalicious communication
UDP flood attack
telecommunication traffic
SYN flood attack
standards
signature based NIDS
sensors
security of data
Resiliency
resilience
pubcrawl
Ports (Computers)
policy-based governance
anomaly based neural network intrusion detection system
NNIDS
nMap scanning attack
neural nets
network intrusion detection systems
Metrics
Intrusion Detection
digital signatures
Databases
Artificial Neural Networks
artificial neural network based IDS
anomaly based NIDS
biblio
Run-Time Attack Detection in Cryptographic APIs
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
proof-of-concept log analysis tool
Wrapping
tools
standards
sensitive cryptographic keys
security of data
security API
run-time attack detection
Resiliency
resilience
pubcrawl
Proposals
APIs
PKCS\#11
Monitoring
key-management attacks
key security
financial infrastructures
Cryptography
cryptographic services
cryptographic API
critical infrastructures
Compositionality
application program interfaces
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Research on Network Security Protection System Based on Dynamic Modeling
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
password
vulnerability risk model
standards
security
safety evaluation model
risk model of intrusion event
Resiliency
resilience
pubcrawl
authentication
network protection system
Metrics
dynamic networks
composability
Companies
Communication networks
Biological system modeling
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Research on Network Security Protection System Based on Dynamic Modeling
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
password
vulnerability risk model
standards
security
safety evaluation model
risk model of intrusion event
Resiliency
resilience
pubcrawl
authentication
network protection system
Metrics
dynamic networks
composability
Companies
Communication networks
Biological system modeling
biblio
Garbled Protocols and Two-Round MPC from Bilinear Maps
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
noninteractive zero-knowledge proof system
Yao's garbled circuits construction
witness encryption
universal composability
two-round UC secure protocol
two-round MPC
standards
Resiliency
resilience
Random access memory
random access machines
RAM programs
pubcrawl
Protocols
bilinear maps
multiparty secure computation protocols
Metrics
garbling arbitrary protocols
garbled protocol construction
encryption
encoding
distributed protocol
Cryptographic Protocols
Computational modeling
composability
Circuit Garbling
black box encryption
biblio
Threats and surprises behind IPv6 extension headers
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
Metrics
telecommunication traffic
standards
security
Resiliency
quality of experience
pubcrawl
Protocols
Probes
Payloads
Monitoring
collaboration
legitimate traffic
ipv6 security
IPv6
IP networks
Internet threats
internet
extension headers
end-user QoE
computer network security
composability
biblio
Security and trust for surveillance cameras
Submitted by K_Hooper on Wed, 02/28/2018 - 11:32am
abstract vulnerabilities
attacks
Cameras
commercial IP camera
Compositionality
Feeds
IP networks
pubcrawl
security
security of data
standards
surveillance
surveillance cameras
telecommunication security
trust relationships
video surveillance
biblio
Optimality of inference in hierarchical coding for distributed object-based representations
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
hierarchical sparse coding
standards
representation learning
pubcrawl
optimisation
NP-hard optimization
near-optimal codes
multiscale representation
Matching pursuit algorithms
learning (artificial intelligence)
L0-norm constraint
inference mechanisms
hierarchical systems
complex synthetic datasets
greedy inference algorithm
greedy algorithms
encoding
distributed processing
distributed object-based representations
Dictionaries
data compression
convolutional matching pursuit
Convolutional codes
convolution
Compositionality
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »