Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Inspection
biblio
Security games on infrastructure networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
pubcrawl
Investment
IT systems
Load modeling
Metrics
network security game
networked control systems
node disruptions
optimal attack plans
Policy-Governed Secure Collaboration
interdiction problem
Resiliency
resource allocation
robust control models
Scalability
Science of Security
security
security of data
strategic edge disruptions
distribution networks
collaboration
communication failures
Communication networks
composability
controller-disturbance interaction
cyber-physical security
cyber-physical systems
cyber-security modelling
Density estimation robust algorithm
attacker-defender interactions
game theory
game theory methods
Games
Human behavior
Human Factors
infrastructure networks
Inspection
interdependent security game
biblio
Process Metrics Are Not Bad Predictors of Fault Proneness
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
Niobium
Trusted Computing
trust-worthy predictions
statistical analysis
static code metrics
software quality
software metrics
pubcrawl
process metrics
predictive security metrics
Predictive models
Predictive Metrics
prediction
pattern classification
Bayes methods
Naive Bayes
Metrics
Inspection
faulty modules
faulty classes
faults
fault/defect prediction models
fault proneness
fault prediction performance evaluation
Couplings
classifier
box plot visual inspection
biblio
A network data security analysis method based on DPI technology
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
protocol matching
network data legality
network data security analysis
network servers
Policy
policy-based governance
power system
power system security
protocol analysis
matched filters
protocol parsing
Protocols
pubcrawl
Resiliency
security gateway
Servers
threat data
visiting data security
deep packet inspection technology
Artificial Neural Networks
collaboration
computer network security
data content detection
data filtering
data legitimacy
data protocol
deep packet inspection (DPI) technology
artificial neural network
DPI technology
Fingerprint recognition
Governance
Government
Inspection
internetworking
Logic gates
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
biblio
A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
pubcrawl170112
two-type inspection queues
supply chains
Steady-state
Stability analysis
Selectee Lanes
security checkpoints
security checkpoint
security
risk-based checkpoint screening system management
risk level
queueing theory
Airports
optimization model
optimisation
Normal Lanes
National security
multi-server queue
mix-integer non-linear programming model
inspection queues
Inspection
delays
congestion
Biological system modeling
biblio
A new X-ray backscatter technology for aviation security applications
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
suspicious object detection
non-intrusive imaging
object detection
one-sided access method
packet parcel
pubcrawl170112
security applications
sensor arrays
supply chain security
National security
threat detection accuracy
twisted-slit collimator
X-ray backscatter camera
X-ray backscatter image enhancement
X-ray backscatter imaging
X-ray backscatter technology
X-ray detection
X-ray imaging
digital radiography
Airports
aviation security applications
avionics
backscatter
Cameras
collimators
detection of dangerous materials
Detectors
air safety
explosive detection
explosive simulants
high-resolution digital detector arrays
Inspection
luggage
luggage inspection
mock-up dangerous materials
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
policy initiatives
supply chains
stylized queueing model
Servers
security-check waiting lines
security-check system
security-check queue
security screening efficiency
security screening effectiveness
security checkpoints
security
Risk
pubcrawl170112
Biological system modeling
inspection risk
inspection delay
Inspection
goods distribution
economic trade-offs
delays
Coxian-2 distribution
Containers
container-inspection decisions
cargo container screening
border protection
biblio
Automated content detection on TVs and computer monitors
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
Image edge detection
TV
television
system manufacturing process
rectangle recognition
quality tests
pubcrawl170111
notebook
Monitoring
line detection algorithms
Inspection
image segmentation
Algorithm design and analysis
image comparison metrics
edge detection algorithms
edge detection
Computers
computer monitors
computer displays
computer aided manufacturing
automatic optical inspection
automatic inspection system images
automated content detection
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »