Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Engines
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
A mixed discrete-continuous optimization scheme for Cyber-Physical System architecture exploration
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
discrete systems
sizing routine
pubcrawl170110
optimization time
optimization
optimisation
mixed discrete continuous optimization scheme
Mathematical model
magnitude reduction
Libraries
Engines
aircraft control
discrete space
discrete optimization routine
discrete architecture selection engine
cyber-physical system architecture exploration
CPS
contracts
continuous sizing engine
computer architecture
Atmospheric modeling
aircraft environmental control system
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 2:04pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 2:01pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 10:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
A framework of awareness for artificial subjects
Submitted by BrandonB on Mon, 05/04/2015 - 2:29pm
optimisation
Artificial Intelligence
artificial subject awareness
Educational institutions
embedded systems
Engines
environment model
fault tolerant computing
History
Monitoring
Semantics
Predictive models
Robustness
self-awareness
self-healing
self-model
self-optimization
semantic attribution
semantic interpretation
biblio
Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service Provider
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
encryption
symmetric-key encryption
symmetric encryption
Servers
secure network coding technique
secret sharing
open cloud DRM service provider
Open Cloud
network coding
multiple secret key sharing
Licenses
key management
key fission engine
Engines
Android SDK
encrypted digital content
Electronic publishing
e-Book readers
e-Book market
digital signatures
digital signature
Digital rights management
digital content copyright
Cryptography
copyright
cloud storage
Cloud Computing
biblio
An Open S-BPM Runtime Environment Based on Abstract State Machines
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
finite state machines
workflow management software
workflow engine
Subject-oriented Business Process Management
subject-oriented BPM
Semantics
S-BPM tools
S-BPM model
program interpreters
Open-S-BPM
Open S-BPM runtime environment
Mathematical model
abstract interpreter model
executable workflow engine
Engines
CoreASM
business process modeling
business data processing
Business
ASM approach
Analytical models
Abstracts
abstract state machine interpreter
Abstract State Machine
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »