Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Distribution Power System Resiliency Improvement Using Distributed Generation and Automated Switching
Submitted by grigby1 on Wed, 02/26/2020 - 4:47pm
Measurement
resiliency scores
resiliency feasible network
resiliency estimation
resiliency enhancement strategy
Resiliency
resilience
Reliability
pubcrawl
power system reliability
power distribution reliability
power distribution
physical threats
modified IEEE 123 node system
analytic hierarchy process
Hurricanes
graph theory
extreme weather events
Distribution system
distribution power system resiliency improvement
distributed power generation
distributed generation
distributed energy resources
cybersecurity threats
contemporary power distribution system
automated switching
automated switches
biblio
Edge-Based Shortest Path Caching for Location-Based Services
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
location-based services
Web Caching
tree data structures
shortest route
shortest path queries
Scalability
road network topology
Resiliency
resilience
R-tree-based cache lookup algorithm
querying origin
query processing
path caching services
path caches
path cache
Metrics
pubcrawl
location based-services
location based services
large-scale path query processing
large-scale
historical path results
greedy-based cache construction algorithm
greedy algorithms
graph theory
Google Maps
edge-based shortest path caching
edge-based shortest path cache
edge-based path cache structure
caching services
cache storage
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Automation of Manual Switches in Distribution Networks Focused on Self-Healing: A Step toward Smart Grids
Submitted by grigby1 on Mon, 02/17/2020 - 5:13pm
power distribution economics
team field
smart power grids
self-healing systems
self-healing networks
self-healing
Resiliency
resilience
reliable system
pubcrawl
power distribution reliability
power distribution networks
automation
multicriteria evaluation
manual switch
graph theory
genetic algorithms
financial compensations
distribution network
continuity indexes violation
continuity index
computational tool
composability
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Maximizing Social Welfare in Fractional Hedonic Games using Shapley Value
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
agent-based methods
Social Agents
Social Welfare
Shapley value-based welfare distribution scheme
Shapley value
player payoffs
optimal coalition structure
fractional hedonic games
decision rules
coalition generation problem
coalition formation
CFSV
Approximation algorithms
Scalability
3G mobile communication
social sciences
Benchmark testing
Human Factors
Stability analysis
Games
5G mobile communication
multi-agent systems
Social network services
graph theory
pubcrawl
game theory
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
Graph Centrality Based Spam SMS Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
Measurement
unsolicited e-mail
unlabeled SMS
unclassified SMS
Support vector machines
status updates
spam SMS detection
spam messages
spam detection
social networking (online)
short messages usage
short messages
security of data
Scalability
pubcrawl
Metrics
centrality scores
labeled SMS
Human Factors
Human behavior
Hidden Markov models
graphs centrality metrics
graph theory
graph centrality measures
Graph Centrality
feature extraction
electronic messaging
degree centrality
Data preprocessing
Data mining
classifier
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »