Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
directed graphs
biblio
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
malware
Signature Matching
IoT malware
directed graphs
Resiliency Coordinator
Malware Analysis
graph embedding
graph theory
source coding
pubcrawl
static analysis
Computers
estimation
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Employing social network analysis to dark web communities
Submitted by grigby1 on Fri, 06/02/2023 - 3:32pm
pubcrawl
Analytical models
Computer crime
dark web
Data mining
directed graphs
Human behavior
Human Factors
Key nodes
organizational aspects
search engines
social interactions
social network analysis
social networking (online)
biblio
Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph Theory
Submitted by grigby1 on Thu, 09/09/2021 - 8:01am
access control subsystem
Chinese Postman Problem
completeness and optimality of testing
composability
Control Theory
directed graphs
Eulerian path
finite deterministic automaton
pubcrawl
resilience
Resiliency
security
software and hardware data security tools
biblio
Actuator Security Index for Structured Systems
Submitted by aekwall on Mon, 01/25/2021 - 11:51am
Human behavior
vulnerable actuators
structured systems
Sensor Systems
security
Resiliency
pubcrawl
power system security
Metrics
Linear systems
Large-scale systems
large scale energy systems
Indexes
actuator security
graph-theoretic conditions
generic security index
discrete-time LTI network systems
discrete time systems
directed subgraphs
directed graphs
control system security
composability
Barium
actuators
actuator security index
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Decentralized Labor Record System Based on Wavelet Consensus Protocol
Submitted by grigby1 on Tue, 12/01/2020 - 1:01pm
Human behavior
wavelet consensus protocol
wavelet blockchain platform
Turing complete smart contracts platform
smart contracts
recruitment
pubcrawl
Portfolios
labour resources
labor record
labor market problems
job market
internet
human trust
blockchain
employment data
employment conditions
Employment
directed graphs
directed acyclic graph system
decentralized labor record system
contracts
consensus protocol
Companies
blockchain solutions
blockchain based system
blockchain based labor record systems
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 10:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Fast and Accurate Continuous User Authentication by Fusion of Instance-Based, Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 01/28/2020 - 1:35pm
fused classifier
user input text
text analysis
pubcrawl
monograph
Metrics
keystroke dynamics systems
keystroke dynamics
keystroke analysis
Keyboards
instance-based graph comparison algorithm
Human Factors
Human behavior
account security
free-text keystroke dynamics
free-text data
directed graphs
digraph
continuous user authentication
Continuous Authentication
consecutive keystrokes
biometrics (access control)
biometrics
behavioral biometric system
authorisation
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
1
2
next ›
last »