Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Vulnerability and Resilience Assessment of Power Systems: From Deterioration to Recovery via a Topological Model based on Graph Theory
Submitted by aekwall on Tue, 07/27/2021 - 2:10pm
Computing Theory
resilience
Cascading Failures
composability
Compositionality
Computing Theory and Resilience
graph theory
Indexes
power grids
power system faults
Power system protection
power systems
pubcrawl
Vulnerability
biblio
A Hybrid Algorithm for Evaluating Trust in Online Social Networks
Submitted by grigby1 on Tue, 07/27/2021 - 12:06pm
Computational modeling
computer theory
graph theory
Human behavior
learning
learning automata
Measurement
online social network
Power capacitors
pubcrawl
Reliability
security
social networking (online)
trust
trust evaluation
Trusted paths
biblio
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis
Submitted by grigby1 on Tue, 04/27/2021 - 2:40pm
Measurement
Semantics
security
Scalability
Resiliency
resilience
Reinforcement learning
pubcrawl
Metrics
Malware Analysis
malware
machine learning algorithms
Knowledge graphs
Cybersecurity
computer security
Big Data
Artificial Intelligence
graph theory
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
Facial Expression Recognition Using Spatial-Temporal Semantic Graph Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
Heuristic algorithms
temporal patterns
spatial-temporal semantic graph network
Spatial Temporal Graph Convolutional Network
spatial patterns
Semantics
Resiliency
resilience
pubcrawl
Neural networks
Metrics
learning (artificial intelligence)
image motion analysis
Human behavior
Action Units
graph theory
Geometry
feature extraction
facial topology structure
facial recognition
Facial Graph Representation
facial expression recognition algorithm
facial expression recognition
face recognition
end-to-end feature learning
dynamic patterns
convolution
biblio
Facial Expression Recognition Based on Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:01pm
feature extraction
Support vector machines
Resiliency
resilience
pubcrawl
object detection
Metrics
image recognition
image classification
Human behavior
graph theory
Graph Neural Network
graph convolutional neural network
fully automatic facial expression recognition
facial recognition
facial landmark detection
facial expression recognition classification
facial expression recognition
facial expression databases
face recognition
face landmarks detection
Face
emotions
emotion recognition
Databases
convolutional neural networks
convolutional neural nets
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
secured communication
Cognitive Radio Security
weighted graph problem
V2V communications
stable transmission path
stable paths
spectrum awareness
shared common channels
secured paths
mobility pattern
efficient routing performance
efficient reactive routing protocol
dynamic behavior
cognitive radio sensor networks
channel availability
Ad hoc networks
telecommunication security
cognitive radio
source node
Routing Protocol
spectrum availability
WSN
Switches
delays
Reliability
Routing
graph theory
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
Gait Phase Segmentation Using Weighted Dynamic Time Warping and K-Nearest Neighbors Graph Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:46pm
Dynamic Time Warping
weighted dynamic time warping algorithm
self-collected IMU gait signals
neural network-based graph embedding scheme
k-nearest neighbors graph embedding
k-nearest neighbors algorithm
k-nearest neighbors
inertial measurement units
gait phase segmentation method
gait phase estimates
gait information
gait cycle
nearest neighbour methods
nearest neighbor search
diseases
gait analysis
graph embedding
Predictive Metrics
image segmentation
Measurement
neural nets
graph theory
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »