Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intelligent systems
biblio
Intelligent System Intricacies: Safety, Security and Risk Management Apprehensions of ITS
Submitted by aekwall on Mon, 02/17/2020 - 2:27pm
pubcrawl
Transportation
Sydney Metro's EMS
Security Risk Management
security and risk management apprehensions
security
Scalability
Safety
risk management
Resiliency
real-time systems
emergency management
Metrics
ITS
Intelligent Transportation Systems
Intelligent Transportation System (ITS)
Intelligent Transportation System
Intelligent systems
information and communications technologies
Environmental management
Emergency Management System (EMS)
emergency management system
biblio
The seven deadly myths of" autonomous systems"
Submitted by Katie Dey on Thu, 09/12/2019 - 5:22pm
human computer interaction
Teamwork
context awareness
Man machine systems
resource management
Intelligent systems
human-centered computing
autonomous systems
Theory of Minds
Human Machine Teaming
C3E 2019
biblio
Research on Cyber Crime Threats and Countermeasures about Tor Anonymous Network Based on Meek Confusion Plug-in
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
Human Factors
Web sites
Tor onion network
Tor anonymous network
robots
pubcrawl
network crime
meek plug-in
meek confusion plug-in
Intelligent systems
Computer crime
Human behavior
flow obfuscation technology
deep website
data privacy
dark website
dark web
cyber crime threats
countermeasure research
computer network security
biblio
SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
neural computing framework
Trojan horses
third-party cloud based machine learning as a service
static neural network model
software algorithm level
SIN2
security
Scalability
Runtime
Resiliency
resilience
pubcrawl
portable DNN computing engine
Payloads
Neural networks
neural nets
AI Poisoning
low-cost modular methodology-stealth infection on neural network
low-cost agile neural Trojan attack methodology
learning (artificial intelligence)
invasive software
Intelligent systems
intelligent supply chain
intelligent service supply chain
Human behavior
dynamic runtime system
DNN security
Deep Neural Network
Computational modeling
Cloud Computing
artificial intelligence industry
biblio
Multi-layer model of swarm intelligence for resilient autonomous systems
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
neural network
intelligence-surveillance-reconnaissance task
intelligent adaptive adversaries
Intelligent systems
learning (artificial intelligence)
lower layers
machine learning techniques
mobile robots
multilayer model
hostile environments
physical configuration
Planning
pubcrawl
reactive layer
resilient autonomous systems
sensors
stable environment
Swarm Intelligence
cyber-physical layer
anti-access area denial environments
artificial life concepts
artificial life paradigm
autonomous aerial vehicles
autonomous systems
bioinformatics
central nervous system
composability
Air Force Research Lab
deliberative layer
Embry-Riddle Aeronautical University
fast-reactive control systems
Force
genetic algorithm
genetic algorithms
genomics
higher layers
biblio
Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
Submitted by grigby1 on Mon, 04/02/2018 - 12:39pm
Metrics
security of data
robots
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
pattern clustering
pattern classification
neural nets
network intrusion behavior modes
network intrusion
Artificial Neural Networks
learning (artificial intelligence)
Intrusion Detection
intrusion data
Intelligent systems
individual owned invasion category
Hafnium compounds
generalized regression neural network clustering analysis
generalized regression neural network
data training
clustering training samples
cloud security intrusion detection
Cloud Security
biblio
Learning composable models of parameterized skills
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
learning (artificial intelligence)
uncertainty
Training
robots
robot skills
robot programming
pubcrawl
Planning
parameterized skills
learning models
composable models
Intelligent systems
intelligent system
intelligent robots
Generators
generative planning and execution system
Explosions
control engineering computing
Compositionality
biblio
AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Kalman filter
virtualized cloud services
Virtual machining
virtual machines
Time series analysis
software fault tolerance
security of data
Scalability
Resiliency
pubcrawl
potential anomalies forecasting
Monitoring
Metrics
Live Migration of Virtual Machines
live migration
Kalman filters
Anomaly Detection
interconnected virtual machines
Intelligent systems
historical data
Detectors
cloud services migration
cloud services
Cloud Security
cloud disruption
Cloud Computing
Autonomic Security
Autonomic Cloud Security
autonomic cloud availability
AutoMigrate framework
AnomalyDetect approach
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
security
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
Internet fraud
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
financial crime
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
Anti-money Laundering
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
« first
‹ previous
1
2
3
4
next ›
last »