Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
biblio
Convolutional Neural Networks Based Scale-Adaptive Kernelized Correlation Filter for Robust Visual Object Tracking
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
adaptive filtering
Correlation
deep convolutional neural networks
feature extraction
kernelized correlation filter
Metrics
multiscale
object tracking
pubcrawl
resilience
Resiliency
Scalability
target tracking
Task Analysis
visual object tracking
visualization
biblio
Software Metrics as Indicators of Security Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
resilience
vulnerable software units
Software systems
software security vulnerabilities
software quality
software operational phase
software metrics
Software Architecture
software architectural characteristics
security vulnerabilities
security of data
security
search problems
Resiliency
coding theory
pubcrawl
nonvulnerable code
Metrics
heuristic search technique
function levels
file levels
Feature Selection
Cryptography
correlation coefficients
Correlation
Compositionality
Complexity theory
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
Reliable Multipath Communication Approach for Internet-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
reliability gain maximization
multipath channels
Multipath communication
multipath transport protocols
Protocols
pubcrawl
RC4CPS dynamic MP selection
Redundancy
Reliability
Monitoring
reliability requirements
reliable multipath communication approach
resilience
Resiliency
Scalability
smart grid applications
transport protocols
Availability
Metrics
Internet-based cyber-physical systems
Internet-based CPS
internet
Human Factors
Human behavior
future communication network
estimation
e2e approach
diversity
cyber-physical systems
Cyber Dependencies
Correlation
computer network reliability
Compositionality
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
biblio
A Hybrid Location Privacy Protection Scheme in Big Data Environment
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
Big Data
big data privacy
Correlation
Cryptography
data privacy
Human Factors
Metrics
Mobile radio mobility management
Policy
privacy
pubcrawl
Resiliency
Scalability
Spatiotemporal phenomena
biblio
Predicting Release Reliability
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
Metrics
bug fixing
code coverage
Computer bugs
conceptual simplification
Correlation
customer experience
customer services
demanding quantitative evidence
field bug
functional extension
internal customers
internal stakeholders
Mathematical model
Measurement
testing
modeling
pre-release metrics
predicting release reliability
prediction
Predictive Metrics
prerelease metrics
pubcrawl
release comparisons
reliability performance
software metrics
software release reliability
software reliability
software reliability assessment mechanism
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
next ›
last »