Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 1:35pm
object-oriented methods
vulnerable source code
source code (software)
software vulnerabilities
software security
software quality metrics
software quality
software metrics
Software
security of data
Security Metrics
security
secure software
pubcrawl
PHP security
object-oriented PHP application
Availability Score
Object oriented modeling
national vulnerability database
metrics testing
Metrics
Measurement
Integrity Score
CVSS
Couplings
Correlation
Confidentiality Score
Complexity theory
code metrics
Code Characteristics
CIA Model
biblio
Embedded Software Fault Prediction Based on Back Propagation Neural Network
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
metrics testing
Training
statistical analysis
software testing activities
software metrics
software fault tolerance
Software
pubcrawl
program testing
nonlinear fitting ability
Neurons
neural nets
back propagation neural network
Metrics
Measurement
formal verification
filter metric set
fault prediction
embedded systems
embedded software fault prediction
embedded software
Correlation
Biological neural networks
Backpropagation
biblio
Comparison of Location Privacy Protection Schemes in VANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:39pm
VANET
manet privacy
special mobile ad hoc network
road traffic.
malicious node attacks
location privacy protection schemes
trajectory privacy
Probability distribution
road traffic
Trajectory
vehicular ad-hoc networks
privacy protection
Compositionality
data privacy
Correlation
Metrics
Wireless communication
vehicular ad hoc networks
VANETs
Roads
privacy
location privacy
pubcrawl
Resiliency
Protocols
telecommunication security
biblio
A Scalable Correlation Clustering strategy in Location Privacy for Wireless Sensor Networks against a Universal Adversary
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
correlation methods
Location Privacy in Wireless Networks
wireless network sensors
universal adversary
scalable correlation clustering strategy
remote Environment
adversary
information privacy
telecommunication network planning
Compositionality
Semantics
energy consumption
scalable
telecommunication security
sensors
trust
Correlation
Metrics
sensor placement
privacy
location privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
security
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
image encryption
probability density
optimized henon mapping
optimized henon
new 2d-logistic chaotic System
Lyapunov exponents
image encryption schema
image cryptosystem
hybrid optimized chaotic system
henon chaotic system
compounded chaotic system
chaotic image encryption algorithm
2D logistic chaotic system
Henon mapping
chaotic cryptography
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Security analysis
Image coding
Correlation
optimisation
Logistics
composability
pubcrawl
Resiliency
encryption
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »