Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 4:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Service Design Metrics to Predict IT-Based Drivers of Service Oriented Architecture Adoption
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Resiliency
work factor metrics
Unified modeling language
structural domain level similarity
software metrics
software engineering metrics properties
SoaML
SOA modeling language
service-oriented architecture
service reuse
service oriented architecture
service interface diagram
service design metrics
Scalability
Business
resilience
pubcrawl
Protocols
Metrics
Measurement
IT-based driver
infrastructure efficiency
ervice design
design flaws
Couplings
Complexity theory
business based capabilities
biblio
A Social Science-based Approach to Explanations for (Game) AI
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
human working memory limitation
xai
working memory
super-sensors
social sciences
social science-based approach
Scalability
Resiliency
resilience
pubcrawl
Object oriented modeling
learning (artificial intelligence)
image recognition
AI revolution
GVGAI framework
Games
explainable AI
deep learning methods
computer games
Complexity theory
complex algorithmic systems
collaboration
Brain modeling
bottom-up approach
baseline definition
Artificial Intelligence
biblio
Two-Phase Incentive-Based Secure Key System for Data Management in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Scalability
Internet of Things
key complexity
key cost
light-weight keys
low-level secure keys
multiphase security
network optimization
privacy
Privacy Policies
pubcrawl
Human Factors
security keys
self-trust incentive level
server-trust incentive level
Servers
service providers
TISK phase-I Generic Service Manager
TISK phase-II Dedicated Service Manager
TISK system
two-phase incentive-based secure key system
user nodes
data manager nodes
authentication
authorisation
authorized transactions
Certificate Generation
Complexity theory
computer network security
data aggregator nodes
data collector nodes
data expert nodes
data integrity
Aggregation
data privacy
data transactions
Database management in IoT
distributed data management
Distributed databases
distributed secure data management system
DSM-C module verifies
expert systems
GSM-C module
high-level secure keys
biblio
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
bayesian attack graphs
vulnerability exploitation
vulerability exploitation
NIST CVSS
NIST common vulnerability scoring system
network security assessment
Gold
CVSS metric version v2.0
CVSS metric version 3.0
CVSS metric version 1.0
CVSS
conditional probability computation method
Security Metrics
BAG
Computing Theory
Complexity theory
Metrics
conditional probability
Bayes methods
authentication
security of data
Measurement
pubcrawl
graph theory
biblio
Should I Bug You? Identifying Domain Experts in Software Projects Using Code Complexity Metrics
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
software components
software projects
ownership high
expert identification
domain experts
complex software system
collective code knowledge
code complexity metrics
Computing Theory
object-oriented programming
Complexity theory
Security Metrics
Computer bugs
Companies
Metrics
Couplings
Data mining
software quality
Software
software metrics
Measurement
pubcrawl
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
D-XMAN: A Platform For Total Compositionality in Service-Oriented Architectures
Submitted by grigby1 on Thu, 08/23/2018 - 11:49am
MusicCorp
total compositionality
SOA development
service-oriented architectures
service-oriented architecture
service composition
Scalability
pubcrawl
platform
partial compositionality
orchestration
choreography
microservices
Java
exogenous connectors
Electronic mail
DX-MAN
Connectors
Computing Theory
Compositionality
composability
Complexity theory
biblio
Towards Collaborative Trust Management
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
Peer-to-peer computing
Trusted Computing
trust profiles
trust management operations
Trust management
trust
taxonomy
Software Architecture
reference architecture
reconfigurable trust management operations
quality of service
pubcrawl
Personalized Trust
Cloud Computing
Human Factors
Human behavior
hardcoded trust computations
groupware
customizable trust management operations
contemporary trust management solutions
computer theory
computer architecture
Complexity theory
Collaborative Trust Computing
collaborative personalized trust management system
collaboration
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »