Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Optimization and Prediction of Intelligent Tourism Data
Submitted by grigby1 on Fri, 09/08/2023 - 10:08am
composability
visualize
optimize
ARIMA model
intelligent data
network model
Technological innovation
Data visualization
Time series analysis
Compositionality
Predictive models
Computational modeling
Scalability
Conferences
Resiliency
resilience
pubcrawl
Neural networks
security
biblio
Recaptured Image Forensics Based on Generalized Central Difference Convolution Network
Submitted by grigby1 on Fri, 09/01/2023 - 3:19pm
deep learning
recaptured image detection
central difference convolution
Human Factors
Image databases
information forensics
Image forensics
Liquid crystal displays
Fuses
feature extraction
Scalability
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolution
biblio
Existing Vulnerability Information in Security Requirements Elicitation
Submitted by grigby1 on Fri, 09/01/2023 - 2:50pm
security
pubcrawl
resilience
Resiliency
Conferences
composability
Compositionality
Software systems
software engineering
requirements engineering
Software Vulnerability
Information Reuse
security requirements elicitation
biblio
Colored Petri Net Reusing for Service Function Chaining Validation
Submitted by grigby1 on Fri, 09/01/2023 - 2:48pm
Libraries
Configuration verification Model reuse
Colored Petri Net
Information Reuse
service function chain
service function chaining
Petri nets
Compositionality
network security
security
composability
Computational modeling
Software
Conferences
Resiliency
resilience
pubcrawl
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
biblio
Research on E-government Information Security Based on Cloud Computing
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
Cloud Computing
Large scale integration
Human Factors
standardization
E-Government
cloud computing security
Compositionality
composability
Information Assurance
Computers
Computational modeling
information security
Scalability
Conferences
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Data-Driven Digital Twins in Surgery utilizing Augmented Reality and Machine Learning
Submitted by grigby1 on Thu, 08/24/2023 - 2:50pm
Software systems
Minimally invasive surgery
minimal invasive surgery
medical digital twin
Laparoscopes
image-guided surgery
Human Factors
Cyber Physical System
cyber physical systems
immersive systems
augmented reality
machine learning
composability
Prototypes
Medical services
privacy
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cloud Storage I/O Load Prediction Based on XB-IOPS Feature Engineering
Submitted by grigby1 on Wed, 08/23/2023 - 3:34pm
Schedules
Cloud Computing
Predictive models
security
pubcrawl
Conferences
performance evaluation
Scalability
i-o systems security
System performance
load balance
feature engineering
block storage
Xgboost
biblio
Digital Forensic Analysis on Caller ID Spoofing Attack
Submitted by grigby1 on Wed, 08/16/2023 - 3:38pm
IDS
SIM card forensic
NIST SP 800-101R1
mobile forensic
caller ID spoofing
fraud
digital forensic
Oxygen
digital evidence
information security
Digital Forensics
composability
Big Data
NIST
Conferences
Resiliency
resilience
pubcrawl
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
1
2
3
4
5
6
7
8
9
…
next ›
last »