Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context modeling
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Information-Centric IoT Middleware Overlay: VSL
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
Scalability
name-based communication architectures complement
Object oriented modeling
Peer-to-peer computing
physical environments
physical surroundings
pubcrawl
resilience
Resiliency
name-based communication architectures
security-by-design
semantically-rich data item lookup
service-centric
service-centric designs
site-local data-centric architecture
site-local installations
virtual state layer
Information Centric Networks
Context modeling
Data models
data-centric
data-centric Internet architectures
data-centric VSL interface
edge-based installations
explicit data
Information Centric Network
computer architecture
information-centric
information-centric IoT middleware overlay
Internet of Things
Internet weather databases
IoT services
middleware
name-based
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by Katie Dey on Mon, 09/09/2019 - 2:14pm
HMT
visualization framework
visualization
security
network security data context
network security
modeling framework
modeling
mission impact situation awareness
mission impact assessment
Knowledge representation
Interactions
Human Machine Teaming
C3E 2019
decision-making
Data visualization
data visualisation
Data models
Dagger framework
Cyberspace
cyber situation awareness
Context modeling
Context
computer network security
Computational modeling
Communication networks
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Metrics
Training
Side-Channels
Scalability
Resiliency
pubcrawl
Neural networks
neural network
model theft
model exfiltration
Adversary Models
memory probing
machine learning
inference
Human behavior
Hardware Security
Hardware
Data models
Context modeling
Computational modeling
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
Multi-Level Security for the 5G/IoT Ubiquitous Network
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Internet of Things
Ubiquitous Computing Security
Transaction Data
Temperature measurement
security model
Scalability
Resiliency
pubcrawl
network domain
network bandwidth
multilevel security model
Multi-Level Security
Metrics
IoT
5G
information security domain
Human Factors
Human behavior
fifth-generation mobile communication networks
Context modeling
Context
computer network security
Computational modeling
BLP
Access Control
5G-IoT ubiquitous network
5G mobile communication
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
safety requirements
Unified modeling language
standards
software assurance
security-critical systems
security requirements
security of data
security management
Security Assurance
security
Scalability
Safety-Critical Systems
safety-critical software
certification
Safety management
safety assurance
Safety
requirements engineering
pubcrawl
integrated computational-physical capabilities
formal verification
documentation
cyber-physical systems
Context modeling
composability
compliance assurance
biblio
Enhanced word embedding with multiple prototypes
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
NLP
word unit
word similarity evaluation task
word representation
word embeddings learning
word embedding
vector space
similar meanings
similar context
Scalability
Resiliency
pubcrawl
Prototypes
Artificial Neural Networks
natural language processing
multiple prototypes
MCBOW
language models
Human behavior
enhanced word embedding
distributed word representation
dense real-valued vector space
Context modeling
Computational modeling
Biological system modeling
basic word repressentation methods
« first
‹ previous
1
2
3
4
next ›
last »