Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Experimental Analysis of Cross-Layer Sensing for Protocol-Agnostic Packet Boundary Recognition
Submitted by aekwall on Tue, 04/19/2022 - 11:18am
Benchmark testing
composability
Conferences
Cross Layer Security
Protocols
pubcrawl
Radio frequency
Resiliency
RF signals
spectral efficiency
wireless networks
biblio
Real Number Signal Processing Can Detect Denial-of-Service Attacks
Submitted by grigby1 on Tue, 04/19/2022 - 10:44am
privacy
Wireless communication
Turing machines
signal processing security
signal processing
Resiliency
resilience
real number signal processing
pubcrawl
Acoustics
Metrics
digital computers
denial-of-service attack
Conferences
composability
Blum-Shub-Smale machine
algorithmic detection
biblio
Improved Physical Layer Security in Visible Light Communications by Using Focused Light Emitters
Submitted by grigby1 on Tue, 04/19/2022 - 10:44am
MISO communication
Visible Light Communications Security
visible light communications
visible light communication
signal processing security
Scalability
resilience
privacy
optical transmitters
physical layer security
light emitting diodes
Lenses
Conferences
collimating lens
Metrics
composability
Resiliency
pubcrawl
biblio
A Tree-Based Machine Learning Methodology to Automatically Classify Software Vulnerabilities
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Manuals
Software Vulnerability categorization
Software
security weaknesses
security
Resiliency
resilience
random forests
pubcrawl
policy-based governance
Conferences
machine learning
Human behavior
Hardware
gradient boosting
Forestry
Decision trees
Databases
Cyber-security
biblio
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Predictive models
Software
Semantics
security weaknesses
Security entity
Security database
Resiliency
resilience
pubcrawl
Conferences
policy-based governance
Measurement
knowledge graph
Knowledge engineering
Human behavior
Graph attention network
Entity relation prediction
Databases
biblio
Cyber-Security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance Cameras
Submitted by grigby1 on Mon, 04/18/2022 - 10:57am
resilience
YOLO
threat detection
surveillance
Substations
Streaming media
Security Risk Estimation
Scalability
risk assessment
Conferences
pubcrawl
Metrics
Meters
Human Factors
fully convolutional deep network
detection algorithms
Cyber-security
Convolutional codes
biblio
Risk-Based Adaptive User Authentication for Mobile Passenger ID Devices for Land/Sea Border Control
Submitted by grigby1 on Mon, 04/18/2022 - 10:56am
Metrics
Security Risk Estimation
Seaports
Scalability
risk-based user authentication
resilience
pubcrawl
mobile passenger ID devices
Mobile handsets
adaptive user authentication
Human Factors
Europe
estimation
Economics
Conferences
border control security
authentication
biblio
DDoS Attack Detection with Packet Continuity Based on LSTM Model
Submitted by grigby1 on Wed, 04/13/2022 - 10:33am
pubcrawl
Human behavior
resilience
Resiliency
Conferences
internet
Information systems
Metrics
DDoS
Time factors
denial-of-service attack
DDoS attack detection
DDoS detection
Packet continuity
biblio
Research on DDoS Attack Detection based on Multi-dimensional Entropy
Submitted by grigby1 on Wed, 04/13/2022 - 10:31am
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Entropy
computer science
detection algorithms
Metrics
Time complexity
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service
Dimension detection
threshold
biblio
Queue Allocation-Based DDoS Mitigation at Edge Switch
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Internet of Things
Switches
Resiliency
resilience
Queueing analysis
pubcrawl
Metrics
Market research
machine learning algorithms
Communication system security
Image edge detection
Human behavior
denial-of-service attack
DDoS attack mitigation
Conferences
Computer simulation
computer network management
composability
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »