Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Using information entropy to analyze secure multi-party computation protocol
Submitted by grigby1 on Fri, 07/15/2022 - 1:02pm
Pervasive Computing Security
uncertainty
Semi-Honest Model
security
secure multi-party computation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Analytical models
multi-party computation
Metrics
information security
information interaction
information entropy
Human Factors
Human behavior
Computational modeling
Big Data
biblio
Recommendation Method of Honeynet Trapping Component Based on LSTM
Submitted by grigby1 on Fri, 07/15/2022 - 12:59pm
data privacy
Pervasive Computing Security
honeynet
Hacker's interests
attention mechanism
LSTM
Bridges
Metrics
network security
Big Data
Computer hacking
Scalability
Analytical models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Predictive models
biblio
API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models
Submitted by aekwall on Thu, 07/14/2022 - 4:20pm
privacy
machine learning
Analytical models
feature extraction
Metrics
Resiliency
composability
Ransomware
ransomware detection
API calls
telecommunication traffic
Nonhomogeneous media
pubcrawl
network traffic
ransomware attacks
ransomware families
biblio
Robustness Analysis of Cyber-Physical Power System Based on Adjacent Matrix Evolution
Submitted by grigby1 on Tue, 07/12/2022 - 3:38pm
Compositionality
Cyber Dependencies
reachable matrix
combinatorial matrix
adjacent matrix
Power system dynamics
Power system protection
cyber-physical power system
Robustness
Resistance
pubcrawl
Metrics
composability
Topology
Scalability
Analytical models
Indexes
Resiliency
resilience
Human behavior
biblio
Conceptual Modelling of Criticality of Critical Infrastructure Nth Order Dependency Effect Using Neural Networks
Submitted by grigby1 on Tue, 07/12/2022 - 3:35pm
Recurrent neural networks
Cyber Dependencies
degree of infrastructure criticality degree of infrastructure dependency
critical information infrastructure protection
Artificial Neural Networks
Compositionality
Complexity theory
Metrics
complex networks
composability
critical infrastructure
Scalability
Analytical models
Indexes
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Analysis of Encrypted Image Data with Deep Learning Models
Submitted by grigby1 on Tue, 07/12/2022 - 3:23pm
Analytical models
policy governance
cryptology
Knowledge Discovery
Compositionality
Loss measurement
Metrics
Data Security
composability
Cryptography
Resiliency
resilience
pubcrawl
Neural networks
information security
collaboration
Training
deep learning
biblio
False Data Injection Impact Analysis In AI-Based Smart Grid
Submitted by grigby1 on Tue, 07/05/2022 - 11:21am
Smart Grid
multi layer perceptron
Data Streaming
Cyber Attacks
False Data Injection
False Data Detection
Knowledge engineering
Multi-factor authentication
composability
Training
Data models
Analytical models
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
Predictive models
biblio
DeCaptcha: Cracking captcha using Deep Learning Techniques
Submitted by grigby1 on Thu, 06/30/2022 - 1:17pm
deep learning
security
CNN
pubcrawl
Human behavior
Analytical models
Computers
composability
computer networks
GANs
usability
captchas
RNN
bidirectional LSTM
CAPTCHA
biblio
Digit Character CAPTCHA recognition Based on Deep Convolutional Neural Network
Submitted by grigby1 on Thu, 06/30/2022 - 1:16pm
Activation Function
handwriting recognition
data science
character recognition
composability
Data models
Analytical models
Human behavior
pubcrawl
CAPTCHA
captchas
convolutional neural networks
convolutional neural network
biblio
Method of Biometric Authentication with Digital Watermarks
Submitted by grigby1 on Tue, 06/14/2022 - 3:13pm
Biological system modeling
watermarks
biometric authentication
certification authority
biometric encryption
Watermarking
Metrics
Fingerprint recognition
fingerprint
encryption
Data models
authentication
Scalability
Analytical models
Resiliency
resilience
pubcrawl
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »