Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adaptation models
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
recommender systems
unified framework
Trusted Computing
trust-aware recommender systems
trust relationships
trust directions
sparse users
Social network services
security of data
Scalability
Resiliency
resilience
Adaptation models
recommendation quality
pubcrawl
Mathematical model
learning (artificial intelligence)
learn directive trust strength
Human Factors
Data models
Computational modeling
cold start
adaptive systems
adaptive method
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
One-Shot Learning Approach for Unknown Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
neural nets
Word2Vec
unknown malware classification
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
one-shot learning network
one-shot learning approach
One-shot learning
Neural Turing Machine
Neural networks
Adaptation models
network systems
natural language processing
Metrics
memory augmented neural network
malware classification
malware behavior
malware API calls sequence
malware
Least Recently Used Access
learning (artificial intelligence)
invasive software
intelligent protection systems
Human behavior
fewshot learning
API Sequence
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 2:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
A CAPTCHA recognition technology based on deep learning
Submitted by aekwall on Mon, 04/01/2019 - 9:07am
feedforward neural nets
Training
Task Analysis
security of data
security breaches
pubcrawl
multitask joint training model
Multi task joint training
model recognition
license plate recognition
learning (artificial intelligence)
image recognition
human-machine distinction technology
Human behavior
handwriting recognition
Adaptation models
feature extraction
deep learning
convolutional neural network model
convolutional neural network
convolution
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
character recognition
captchas
CAPTCHA recognition technology
CAPTCHA
automatic malicious program attack
adaptive learning rate
biblio
Prototyping Self-Managed Interdependent Networks - Self-Healing Synergies against Cascading Failures
Submitted by aekwall on Mon, 03/25/2019 - 8:54am
self-managed interdependent networks
power system faults
power system interconnection
Power system protection
power system reliability
pubcrawl
public domain software
real-world interdependent networks
resilience
self-healing
self-healing mechanism
self-healing networks
self-healing synergies
power grids
self-management
self-management software systems
SFINA
simulation
simulation framework for intelligent network adaptations
Smart Grid
socio-economic effects
Software
software artifact
techno-socio-economic sectors
Unified modeling language
interdisciplinary scope
cascading failure
catastrophic instabilities
complex networks
composability
Computational modeling
digital society
distributed system
failure analysis
general prototyping approach
healer network
interdependent networks
interdependent power networks
Adaptation models
Load flow
Load modeling
modeling
modular design solution
multiplex networks
network interconnection
open source software extension
organizational constraints
power cascading failures
power engineering computing
power flow exchanges
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
Predictive models
resilience
pubcrawl
Metrics
composability
Training
Adaptation models
Neural networks
Perturbation methods
Image reconstruction
noise reduction
White Box Security
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »