Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
WAS-Deletion: Workload-Aware Secure Deletion Scheme for Solid-State Drives
Submitted by aekwall on Wed, 04/13/2022 - 10:20am
Conferences
encryption
pubcrawl
Scalability
privacy
resource management
n/a
Costs
adaptive scheduling
Electric breakdown
solid state drives
data deletion
biblio
Deletion Error Correction based on Polar Codes in Skyrmion Racetrack Memory
Submitted by aekwall on Wed, 04/13/2022 - 10:19am
simulation
Conferences
pubcrawl
Scalability
privacy
encoding
parity check codes
Decoding
error correction codes
error correction
deletion error
polar codes
racetrack memory
data deletion
biblio
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
Submitted by aekwall on Wed, 04/13/2022 - 10:15am
security
Intrusion Detection
Internet of Things
performance evaluation
machine learning
Conferences
pubcrawl
Resiliency
telecommunication traffic
Distance measurement
intrusion detection system
network profiling
Productivity
Damage Assessment
biblio
Study on Invulnerability Assessment of Optical Backbone Networks Based on Complex Networks
Submitted by aekwall on Wed, 04/13/2022 - 10:13am
Resists
Cloud Computing
Bandwidth
Conferences
pubcrawl
Resiliency
Resistance
Integrated optics
complex networks
complex network
damage resistance assessment
optical backbone network
Damage Assessment
biblio
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 04/12/2022 - 12:18pm
privacy
Data Sanitization
network intrusion detection
data integrity
Adversarial Machine Learning
Training data
Compositionality
military communication
composability
Training
Conferences
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
biblio
Differentially Private String Sanitization for Frequency-Based Mining Tasks
Submitted by grigby1 on Tue, 04/12/2022 - 12:18pm
composability
string algorithms
frequent pattern mining
dynamic programming
Data Sanitization
genomics
Natural languages
differential privacy
Compositionality
pubcrawl
privacy
Data models
Heuristic algorithms
Conferences
Resiliency
resilience
Human behavior
biblio
Semi-Supervised Feature Embedding for Data Sanitization in Real-World Events
Submitted by grigby1 on Tue, 04/12/2022 - 12:17pm
Signal processing algorithms
Image sanitization
forensic application
feature embedding
data relevance analysis
supervised learning
Data Sanitization
semi-supervised learning
Semisupervised learning
social networking (online)
signal processing
Compositionality
composability
privacy
Conferences
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms
Submitted by grigby1 on Tue, 04/12/2022 - 12:16pm
composability
information sharing
Data Sanitisation
Alarm systems
cyber threat intelligence
Data Sanitization
Interconnected Systems
Compositionality
information management
pubcrawl
Production
data privacy
privacy
Ecosystems
Conferences
Resiliency
resilience
Human behavior
biblio
Template Clustering for the Foundational Analysis of the Dark Web
Submitted by grigby1 on Tue, 04/12/2022 - 12:12pm
feature extraction
machine learning
pubcrawl
Human behavior
Conferences
Artificial Intelligence
Big Data
Data mining
Web pages
information retrieval
dark web
law enforcement
Cybercrime
Template Clustering
Web Mining
biblio
A Security Scoring Framework to Quantify Security in Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
industrial cyber-physical systems
threat analysis
Security Scoring
security scalability
Security Rating
Security Metrics
security metric
pubcrawl
Metrics
security weaknesses
Data models
cyber-physical systems
critical infrastructure
connected vehicles
Conferences
automation
Adaptation models
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »