Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
feature extraction
pubcrawl
Metrics
resilience
Conferences
Scalability
privacy
data privacy
Fingerprint recognition
Redundancy
parity check codes
Resiliency
Fuzzy Cryptography
biblio
Comparing Ransomware using TLSH and @DisCo Analysis Frameworks
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
pubcrawl
Metrics
resilience
Conferences
Scalability
Big Data
Feeds
Ransomware
Resiliency
Intermediate Representation
Locality-Sensitive Hash
threat indicators
Fuzzy Cryptography
biblio
A Stealthier False Data Injection Attack against the Power Grid
Submitted by grigby1 on Tue, 09/20/2022 - 2:13pm
pubcrawl
policy-based governance
resilience
Conferences
Scalability
Computers
Smart Grids
forecasting
automatic generation control
Resiliency
adaptive control
Automatic frequency control
false trust
biblio
Threshold-Based Analysis of the Code Quality of High-Performance Computing Software Packages
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
Clang
codes
Complexity theory
Computing Theory
Conferences
Data mining
datasets
LLVM
Measurement
Metrics
pubcrawl
Security Metrics
software packages
software quality
static analysis
statistical analysis
biblio
Efficient Parallel Algorithms for Computing Percolation Centrality
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
pubcrawl
Metrics
Conferences
graphics processing units
Transportation
social networking (online)
Gain measurement
Security Metrics
Computing Theory
High performance computing
Silver
biblio
Towards 5G-ready Security Metrics
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
Organizations
pubcrawl
Metrics
Conferences
5G mobile communication
Computational modeling
Industries
Measurement
cloud
Telecommunications
5G
attack graph
Security Metrics
Computing Theory
network function virtualization
biblio
A Named Entity Recognition Based Approach for Privacy Requirements Engineering
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
machine learning
pubcrawl
Human behavior
Conferences
Scalability
privacy
Agile development
named entity recognition
Bridges
requirements engineering
Knowledge engineering
expert systems
Data protection
Human Factors
privacy requirements engineering
user stories
biblio
A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
computer architecture
collaboration
security
IoT
pubcrawl
resilience
Conferences
performance evaluation
Scalability
authentication
Protocols
Fog computing
AVISPA
Internet security
Resiliency
authentication protocol
biblio
Optimizing the Allocation of Secure Fog Resources based on QoS Requirements
Submitted by grigby1 on Fri, 09/16/2022 - 4:37pm
Internet of Things
Cloud Computing
security
pubcrawl
resilience
Conferences
Scalability
Computational modeling
Fog computing
quality of service
Virtual machining
resource allocation
Resiliency
Multi-Objective Optimization
fog security
Security Optimization
biblio
Whole-chain supervision method of industrial product quality and safety based on knowledge graph
Submitted by grigby1 on Fri, 09/09/2022 - 4:01pm
quality assessment
supply chain risk assessment
quality and safety supervision
Product design
named entities recognition
knowledge graph
industrial products
BiLSTM-CRF
relation extraction
pubcrawl
Neo4j
Regulation
Production
Data models
Safety
Conferences
Metrics
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »