Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Filtering
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
A Personalized Global Filter To Predict Retweets
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
adaptive filtering
evaluation
Filtering
machine learning
Metrics
personalization
pubcrawl
recommendation
resilience
Resiliency
Scalability
social media
social networks
Twitter
user modeling
biblio
Entropy-Based Security Analytics: Measurements from a Critical Information System
Submitted by grigby1 on Tue, 02/06/2018 - 1:33pm
Information systems
text analytics
security of data
security
Scalability
Runtime
real-world air traffic control information system
pubcrawl
operating systems
Metrics
log analytics
Intrusion Detection
air traffic control
Human Factors
Human behavior
Filtering
Event logging
entropy-based security analytics
Databases
Data mining
data analytics framework
critical information system
composability
biblio
The distributed denial of service attacks (DDoS) prevention mechanisms on application layer
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
Http Post
tools
Slowloris
Servers
RUDY
Resiliency
pubcrawl
Metrics
IP networks
Human behavior
App-Ddos attacks
Http Get
Floods
Filtering
DNS
DDoS Attack Prevention
Computer crime
composability
Bandwidth
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
HVS-based local analysis of denoising efficiency for DCT-based filters
Submitted by grigby1 on Wed, 03/08/2017 - 2:03pm
Image edge detection
visualization
pubcrawl170111
pre-filtering stage
noise removal
noise reduction
multimedia system
Measurement
local analysis
image visual quality improvement
image filtering
BM3D filter
image denoising
HVS-metrics
human vision system
Filtering
discrete cosine transforms
discrete cosine transform
denoising efficiency HVS-based local analysis
DCT-based filters
DCT-based filter
communication system
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
A model for the design of next generation e-supply chain digital forensic readiness tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
Filtering
trading partners
supply chain management
Software
pubcrawl170109
Next generation networking
network forensics
Monitoring tools
Monitoring
internet
information and communications technology
ICT
Forensics domains
Business
eSC environment
electronic supply chain
electronic commerce
e-Supply Chains (eSCs)
e-supply chain
Digital Forensics
digital forensic readiness tools
Digital forensic readiness (DFR)
Digital forensic Investigation (DFI)
Digital forensic data analysis tools
Cybercrime
cyber-crime
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 12:26pm
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
biblio
"DPCM-quantized block-based compressed sensing of images using Robbins Monro approach"
Submitted by grigby1 on Tue, 02/21/2017 - 12:49pm
Image coding
signal reconstruction
Robbins Monro approach
RM approach
pubcrawl170104
parametric iterative CS reconstruction technique
Nyquist rate
Lempel-Ziv-Welch channel coding technique
Lempel-Ziv-Welch channel coding
Iterative methods
Image reconstruction
block SPL algorithm
frequency-domain analysis
frequency domain filtering
Filtering
DPCM-quantized block-based compressed sensing
differential pulse coded modulation
Differential pulse code modulation component
differential pulse code modulation
compressive sampling
compressed sensing
channel coding
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »