Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Weapons
biblio
Progressive Standard Operating Procedures for Darkweb Forensics Investigation
Submitted by grigby1 on Fri, 09/01/2023 - 3:18pm
Digital Forensics
Space technology
artifacts
Human Factors
Tor
drugs
cryptocurrency
darkweb
Weapons
information forensics
feature extraction
Forensics
information and communication technology
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Effective DDoS Attack Detection using Deep Generative Radial Neural Network in the Cloud Environment
Submitted by grigby1 on Fri, 07/21/2023 - 2:15pm
Feature Selection
sigmoid activation function
(Network Security Lab) NSL-KDD dataset
false trust
Distributed Denial of Service (DDoS)
Resiliency
pre-processing
Web and internet services
denial-of-service attack
Weapons
Cloud Computing
classification
resilience
Classification algorithms
Scalability
collaboration
policy-based governance
pubcrawl
Neural networks
feature extraction
biblio
ASMBoT: An Intelligent Sanitizing Robot in the Coronavirus Outbreak
Submitted by grigby1 on Thu, 06/22/2023 - 4:13pm
COVID-19
Ultrasonic Sensor
Surface Disinfectant
Sanitizing Machine
pumps
Grid-EYE Sensor
sanitization
Resiliency
Pandemics
pubcrawl
sustainable development
Data Sanitization
Weapons
Economics
Robot sensing systems
Compositionality
composability
resilience
biblio
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis
Submitted by grigby1 on Fri, 03/31/2023 - 11:28am
Logic gates
pubcrawl
Human behavior
Scalability
telecommunication traffic
Virtual private networks
bitcoin
Distributed databases
Government
Weapons
Human Factors
Traffic analysis
Bitcoin transactions
Traceability Method
bitcoin security
biblio
A comparitative study of machine learning models for the detection of Phishing Websites
Submitted by grigby1 on Fri, 02/03/2023 - 5:23pm
Training
Predictive models
machine learning
pubcrawl
Human behavior
Phishing
Web pages
Uniform resource locators
detection
Weapons
Terrorism
phishing Websites
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
biblio
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach
Submitted by grigby1 on Fri, 07/15/2022 - 12:44pm
integrated circuits
Statistical relational learning
exploits
relational database security
Pipelines
Weapons
knowledge based systems
Metrics
composability
feature extraction
Instruments
security
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
Submitted by grigby1 on Mon, 06/13/2022 - 3:38pm
Scalability
Flash Crowd
density-based clustering
Web and internet services
DDoS Attack
big data security in the cloud
Weapons
Metrics
Big Data
deep learning
Resiliency
resilience
pubcrawl
machine learning algorithms
machine learning
Cloud Computing
Training
biblio
Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques
Submitted by grigby1 on Mon, 06/06/2022 - 12:56pm
Training
machine learning
pubcrawl
Scalability
Databases
natural language processing
Weapons
Terrorism
Human Factors
law enforcement
human in the loop
human-in-the-loop
information extraction
biblio
Asymmetric Analysis of Anti-Terrorist Operations and Demand for Light Weapons under the Condition of Informationization
Submitted by grigby1 on Tue, 04/26/2022 - 10:35am
pubcrawl
Weapons
Training
Terrorism
Technological innovation
small arms
Scalability
Resiliency
resilience
Anti-terrorist operations
Informationization
Information age
Image Processing
Human behavior
Deterrence
Cyberspace
Asymmetry
1
2
3
4
5
next ›
last »