Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Engines
biblio
Deep packet inspection Management application in SDN
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
resilience
JSON-Java Script Object Notation
nonrelational data base
north-bound application
Open vSwitch-Open Virtual Switch
pubcrawl
QoS-Quality of Service
quality of service
real-time systems
JSON format
Resiliency
Scalability
SDN architecture
SDN-Software Defined Networking
SNMP trap notifications
software defined networking
Switches
application signature data analysis
Inspection
flow provisioning behavior
Engines
DPI-Deep Packet Inspection
DPI management application
digital signatures
deep packet inspection management
deep packet inspection
Databases
data representation
data flows
data analytic engine
data analysis
computer network security
application threshold
biblio
Toward the SIEM architecture for cloud-based security services
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
intelligent cyber-threat
virtualization technologies
virtualisation
Software Architecture
SIEM architecture
SIEM
security-as-a-service
security of data
security information and event management
SECaaS platform
SECaaS
pubcrawl
Cloud Computing
information security
Engines
Data models
Data mining
Cryptography
Correlation
computational intelligence
Compositionality
composability
cloud-based security service
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
14.3 A 28nm SoC with a 1.2GHz 568nJ/prediction sparse deep-neural-network engine with \#x003E;0.1 timing error rate tolerance for IoT applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:07pm
Internet of Things
VDD scaling
timing error rate tolerance
timing
Throughput
system-on-chip
sign-magnitude number format
Resiliency
resilience
Razor timing violation detection
pubcrawl
programmable FC-DNN accelerator design
Program processors
Neural Network Resilience
neural nets
IoT applications
1.2GHz 568nJ/prediction sparse deep-neural-network engine
frequency 667 MHz
frequency 1.2 GHz
frequency 1 GHz
FCLK scaling
Error analysis
Engines
Energy Efficiency
datapath logic
data sparsity
circuit-level timing violation tolerance
circuit resilience
algorithmic resilience
algorithmic error tolerance
aggregate timing violation rates
28nm SoC
biblio
A Framework for Cognitive Recommender Systems in the Internet of Things (IoT)
Submitted by grigby1 on Thu, 05/24/2018 - 12:10pm
Internet of Things(IoT)
Servers
sensors
Scalability
Resiliency
resilience
recommender systems
pubcrawl
peer-to-peer networks
Peer-to-peer computing
IoT
cognitive radio
Internet of Things
information technology
Human Factors
Human behavior
Engines
cognitive systems
cognitive system
cognitive recommender systems
cognitive radio networks
biblio
Impact of Replacement Policies on Static-Dynamic Query Results Cache in Web Search Engines
Submitted by grigby1 on Mon, 03/26/2018 - 12:54pm
replacement policies
Web search engines
Web search engine companies
Web search engine
Web search
Web Caching
static-dynamic query
static-dynamic cache
search engines
SDC
Scalability
Resiliency
resilience
Algorithms
real large scale query logs
query results cache
query processing
pubcrawl
Metrics
law enforcement
internet
Engines
Companies
Clocks
caching query
cache system
biblio
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
obscuration technique
Logic gates
Metrics
moving target defense
moving target IPv6 defense
MT6D processor
network address
network infrastructure
network level
network packet processor
network processor
network time protocol listener
keyed access
operating system kernel
operating system kernels
personal area networks
Protocols
pubcrawl
Register Transfer Level network security processor implementation
Resiliency
Routing protocols
RTL development
system architectural design
system level functions
federal networks
application specific integrated circuits
ASIC
CISC architecture
Clocks
collaboration
complex instruction set computer architecture
composability
computer network security
cryptographic dynamic addressing
Encapsulation
Engines
application specific integrated circuit variant
FPGA
Hardware
hardware engine
HE-MT6D
Homeland Security Cyber Security Division
IEEE 802.3 Ethernet
Instruction sets
internet
IP networks
IPv6
ipv6 security
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »