Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
search engines
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
health domain Web pages
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
supervised learning
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
text analysis
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
security of data
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
BlackWidow: Monitoring the Dark Web for Cyber Security Information
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
illegal services
web services
security analyst users
search engines
pubcrawl
open source intelligence
multiple dark Web
login information
learning (artificial intelligence)
knowledge graph
invasive software
interactive visual exploration
information gathering
information collection
BlackWidow
Human Factors
Human behavior
fraud
Docker-based microservice architecture
Dark Web services
Dark Web analysis
dark web
cybersecurity-related topics
cyber security intelligence purposes
cyber security information
cyber security domain
cyber intelligence
cyber criminals
biblio
Deep Packet Inspection Through Virtual Platforms using System-On-Chip FPGAs
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
resilience
virtual platforms
virtual platform
transaction level modeling
TLM
time-varying systems
time-domain analysis
system-on-chip FPGA
system-on-chip
system on chip
Software
search engines
Scalability
Resiliency
computer architecture
pubcrawl
Mentor Vista
logic design
Inspection
hybrid CPU/FPGA
hardware-IP based architecture
hardware accelerators
Hardware
field programmable gate arrays
ESL
deep packet inspection
CPU-DMA based architecture
biblio
A Nearest Neighbor Search Engine Using Distance-Based Hashing
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
query processing
query point
high-dimensional data
hardware search engine
FPGA-based nearest neighbor search engine
flexible distance-based hashing
distance based hashing
nearest neighbor search algorithm
nearest neighbor search
file organisation
pubcrawl
search problems
search engines
nearest neighbour methods
Measurement
Metrics
parallel processing
field programmable gate arrays
FPGA
biblio
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
malicious certificates
Web sites
Error analysis
Certificate-Transparency
Computed tomography
CT
error rate
Google Chrome web browser
HTTPs
Compositionality
misissued certificates
search engines
security benefits
usable-security
Web-PKI
websites
Web Browser Security
security of data
Browsers
certificate transparency
Metrics
online front-ends
composability
internet
Ecosystems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
Monitoring
security
biblio
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Training
feature extraction
machine learning
Forestry
Support vector machines
pubcrawl
security
Kernel
Metrics
graph mining
search engines
web spam
webgraphs
predictive security metrics
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
search problems
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
optimizations
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
dynamic clone search approaches
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
Asm2Vec
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
biblio
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
testing
Servers
security system
security risks
search engines
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Pairing Encryption
machine learning transactions
machine learning engines
attribute-based encryption
low time consumption
learning (artificial intelligence)
IoT applications
Internet of Things
internal machine learning architecture
Human behavior
Engines
Cryptography
CP-ABE
computer network security
Computational modeling
computation process
composability
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
« first
‹ previous
1
2
3
4
next ›
last »