Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
knowledge based systems
biblio
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
Submitted by aekwall on Mon, 03/04/2019 - 9:47am
hardware-in-the-loop
Wide Area Monitoring Protection and Control
wide area monitoring
WAMPAC systems
Substations
substation
smart power grids
Smart Grids
Protection and Control systems
power system forensics
power system analysis computing
PMUs
Phasor measurement units
knowledge based systems
knowledge base
human-in-the-loop security center paradigm
hardware-in-the loop simulation
forensic investigations
Forensic Artifacts
Evidence
authentication
attack-based digital forensic evidences
Digital Forensics
attribution
Metrics
composability
pubcrawl
Human behavior
cyber-attack
Monitoring
biblio
Adaptive Cache Replacement in Efficiently Querying Semantic Big Data
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
knowledge bases querying
web services
triplestore
semantic Big Data querying
relational databases
RDF Caching
RDBMS
query response
query processing
query log
LRU
Linked Data
LFU
least recently used
least frequently used
Big Data
knowledge based systems
forecast method
exponential smoothing
Cache replacement
adaptive cache replacement policy
ACR policy
Web Caching
cache storage
Conferences
Scalability
Resiliency
Metrics
pubcrawl
biblio
A Multi-Agent System for Autonomous Adaptive Control of a Flapping-Wing Micro Air Vehicle
Submitted by el_wehby on Thu, 05/17/2018 - 5:51pm
microrobots
wing movements split-cycle control
vehicles
vehicle pose estimation
vehicle control
telerobotics
subsumption architecture rule base
Storage tanks
rule base design
online learning process
multiagent system architecture
multiagent adaptive controller
multi-agent systems
motion control
Monitoring
mobile robots
adaptive control
learning (artificial intelligence)
knowledge based systems
intrinsic evolution
Force
flapping-wing microair vehicle
fault tolerant control
extrinsic evolution
Color
Cameras
biomimetics
biomimetic flapping-wing vehicles
autonomous aerial vehicles
autonomous adaptive control
agent task scheduling
1239196
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
A framework for digital forensics analysis based on semantic role labeling
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Labeling
text analysis
semantic texts annotation
Semantics
semantic role labeling
semantic annotation
Scalability
Resiliency
pubcrawl
Object recognition
natural language processing
Mobile handsets
Crime Analysis
knowledge based systems
knowledge base
Human behavior
frame semantics
FrameFOR
forensic frames
forensic experts
forensic analysis
Digital Forensics
digital forensic analysis
biblio
Intelligent system of knowledge control with the natural language user interface
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Semantics
natural language interfaces
natural language processing
Natural languages
natural language user interface
output machine
parallel computations
parallel method
pubcrawl
Resiliency
Scalability
semantic analysis
natural language interface methods
semantic structures
Skolem-transformation
specialized inference machines
specialized module
standard knowledge
syntactic analysis
testing
test systems
Training
training systems
user interfaces
knowledge base
control systems
deductive inference
first-order predicate calculus
Human behavior
human-computer dialogue capabilities
inference machine
inference mechanisms
intellectual subsystem
intelligence
intelligent interpreter
intelligent system
Computers
knowledge based systems
knowledge control
knowledge processing systems
Knowledge quality control
Knowledge representation
lexical processor
machine testing systems
modern control
morphological analysis
natural language interface
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Storage as a parameter for classifying dynamic key management schemes proposed for WSNs
Submitted by grigby1 on Wed, 03/29/2017 - 11:33am
policy-based governance
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
target tracking
storage
security
secure communications
Resiliency
resilience
pubcrawl
Artificial Neural Networks
neural networks security
Neural networks
neural network
Monitoring
Metrics
knowledge based systems
key management
healthcare monitoring
dynamic key management scheme classification
Computers
composite keys
border control
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Decoupling Identity Resolution from the Maintenance of Identity Information
Submitted by BrandonB on Wed, 05/06/2015 - 12:21pm
Entity Resolution
Synchronization
Robustness
robust information access
quality management
Organizations
maintenance engineering
knowledge based systems
Context
decoupling identity resolution
EIIM model
entity identity structures
batch IR configuration
ER
Erbium
identity information
identity knowledge base
Identity Life Cycle Management
identity management service
IKB
information quality
information retrieval
Interactive Identity Resolution
« first
‹ previous
1
2
3
4
5
next ›
last »