Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
knowledge based systems
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 2:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
Preservation System for Scientific Experiments in High Performance Computing: Challenges and Proposed Concept
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
scientific experiment
research experiments preservation
research experiments
research data management
preservation system
preservation process
HPC system
HPC computations
HPC
future reproduction
created experiment
containerization
computing system
case preservation
operating systems
security of data
High performance computing
Compositionality
reproducible research
Predictive Metrics
resilience
parallel processing
Containers
knowledge based systems
Libraries
internet
pubcrawl
operating system
Hardware
Servers
biblio
Multi-Factor Authentication Modeling
Submitted by aekwall on Mon, 02/10/2020 - 12:02pm
multifactor authentication
risk-based authentication
risk management
Resiliency
pubcrawl
patents
password
omnifactor authentication
multiple authentication factors
multifactor authentication modeling
acceptable authentication methods
Metrics
message authentication
knowledge based systems
Human Factors
fraud detection system
Fingerprint recognition
digital fingerprint
authorisation
authentication
biblio
Context Sensitive Conversational Agent Using DNN
Submitted by aekwall on Mon, 12/16/2019 - 2:26pm
Aerospace electronics
conversational agent
user query
storage system
speech processing
software agents
interactive systems
intelligent conversational agent
DNN
dialog system
deep neural networks
Coversational Agent
context sensitive conversational agent
context identification
conversation agents
deep learning
Scalability
information retrieval
natural language processing
knowledge based systems
knowledge base
query processing
multi-agent systems
Neural networks
neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
machine learning algorithms
Conferences
biblio
Neural Encoder-Decoder based Urdu Conversational Agent
Submitted by aekwall on Mon, 12/16/2019 - 2:26pm
attention driven deep encoder-decoder based neural conversational agent
conversational agent
Urdu language
sequence to sequence
rule based methods
recurrent neural network
neural network based techniques
neural encoder-decoder based Urdu conversational agent
language translation
deep encoder-decoder based neural conversational agent
conversational model
conversation agents
chatbot
Scalability
conversational agents
encoding
recurrent neural nets
natural language processing
knowledge based systems
multi-agent systems
Metrics
deep learning
pubcrawl
Human behavior
machine learning
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
military computing
Training
simulated annealing
Security & Defense applications
security
review CI applications
pubcrawl
Oceans
neural nets
NATO Nations
Artificial Intelligence
maritime domain
knowledge based systems
groupware
evolutionary computation
Cryptography
computational intelligence
Compositionality
composability
CI techniques
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
CoderChain: A BlockChain Community for Coders
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
blockchain community
Automated Secure Software Engineering
software related knowledge
software development community
online community
knowledge contribution
Distributed databases
cryptocurrencies
CoderChain
code review
code assessment
Conferences
blockchain based database
software engineering
knowledge based systems
computer security
Handheld computers
blockchain
composability
pubcrawl
Resiliency
biblio
Threat Extraction Method Based on UML Software Description
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
knowledge based systems
Automated Secure Software Engineering
Unified modeling language
UML software description
threat knowledge base
threat extraction method
Software systems
software system
software development
software behavior
software application
sequence diagram
security relevant attributes
Threat Modeling
human knowledge
Extracting threats
software engineering
Databases
software security
Computational modeling
composability
pubcrawl
Resiliency
security
security of data
« first
‹ previous
1
2
3
4
5
next ›
last »