Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Weapons
biblio
Cross-Stack Threat Sensing for Cyber Security and Resilience
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
Intrusion Detection
Weapons
tactical deception capabilities
Software
Servers
sensors
security of data
security
Routing
Resiliency
resilience
pubcrawl
Production
national interest networks
cyber security
honeypots
equipping applications
deceptive attack-response capabilities
deception
cyber-threat data
active mitigation capabilities
composability
Cross Layer Security
cross-stack sensor framework
cross-stack threat sensing
Cyber Operations
cyber resilience
biblio
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
Shape
metric-based balanced indexing tree
Metrics
National security
Performance Metrics
pubcrawl
resilience
Resiliency
rifle database
Scalability
metric space indexing
Shape Signatures
Similarity Indexing Methods
tree data structures
visual databases
visual retrieval systems
visualization
weapon images
Weapons
feature representation
Balanced Trees
Big Data
big data security
content-based retrieval
database indexing
Department of Homeland Security
DHS applications
feature extraction
balanced search
Fourier descriptors
gun database
image retrieval
image retrieval systems
indexing
invariance properties
M-tree
Measurement
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
biblio
An evaluation of region based object detection strategies within X-ray baggage security imagery
Submitted by grigby1 on Thu, 06/07/2018 - 3:03pm
security
policy-based governance
Policy-Governed Secure Collaboration
Proposals
pubcrawl
R-CNN/R-FCN variants
region based object detection
resilience
Resiliency
ResNet-101
Policy
sliding window driven CNN approach
SWCNN
Task Analysis
transfer learning
VGG16
Weapons
X-ray baggage security
X-ray baggage security imagery
X-ray imaging
image classification
cluttered X-ray security imagery
collaboration
convolution
cyber physical systems
deep learning
Faster Region-based CNN
feature extraction
first-stage region proposal
Fully Convolutional Networks
class firearm detection problem
ImageNet dataset
learning (artificial intelligence)
Metrics
microsoft windows
neural nets
neural networks security
object class X-ray detection problem
object detection
object localization strategies
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach
biblio
Hunting for Naval Mines with Deep Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
sonar imaging
modest DNN model
naval engineering computing
neural nets
privacy
pubcrawl
remotely operated vehicles
robot vision
sea faring vessels
side-scan sonar imagery
Sonar
minelike objects
support vector machine
Support vector machines
threat vectors
Throughput
trainable parameter count
Training
Training data
Underwater vehicles
visualization technique
Weapons
DNN depth
autonomous unmanned underwater vehicle
Brain modeling
calculation requirements
computation requirements
Computational modeling
data distribution training
Data models
deep neural network methods
deep neural networks
detection efficacy
autonomous underwater vehicles
DNN models
explosive naval mines
explosives
feature extraction
image recognition
image recognition tasks
learning (artificial intelligence)
memory requirements
Metrics
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
Mining the Dark Web: Drugs and Fake Ids
Submitted by grigby1 on Fri, 11/03/2017 - 11:28am
data wrangling
Web sites
Weapons
Tor
The Silk Road
Roads
nonstandard communication protocols
law administration
internet
illegal item marketplace
governmental bodies
FBI
fake ids
Europol
etl processing
drugs
security
Data mining
Data collection
dark Web mining
dark Web marketplaces
dark web
counterfeit documents
bitcoins
authomation
Agora
security of data
cryptocurrencies
Human Factors
Human behavior
pubcrawl
biblio
On visualizing threat evaluation configuration processes: A design proposal
Submitted by BrandonB on Thu, 04/30/2015 - 1:51pm
military computing
Weapons
visualization
transparency
threat evaluation configuration process
threat evaluation
threat estimation
relevant parameter
Prototypes
Proposals
proof-of-concept prototype
military expert system designer
Data models
human computer interaction
high-level information fusion
Guidelines
expert systems
expert operators
estimation theory
estimation
design proposal
design process model
design
decision-making
« first
‹ previous
1
2
3
4
5
next ›
last »