Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Syntactics
biblio
An Algebraic Expert System with Neural Network Concepts for Cyber, Big Data and Data Migration
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
Relational Database
machine learning experts system
mathematical algebraic form
neural nets
neural network
neural network computational graph structure
neural network node structure
Neural networks
output layers
pubcrawl
machine assistance approach
relational databases
Resiliency
rule probabilities
Scalability
security
structured approach
Syntactics
trees (mathematics)
value probabilities
data migration applications
algebraic expert system
Artificial Intelligence
Bayes methods
Bayesian probability tree approach
Big Data
cognition
Cyber database
data handling
data migration
False Data Detection
expert systems
Expert Systems and Security
grading decisions
Human behavior
Information Assurance
knowledge based systems
knowledge-base organization
Knowledgebase
learning (artificial intelligence)
biblio
Style-Aware Neural Model with Application in Authorship Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
Neural networks
writing style
Training
text analysis
syntax encoding
syntax
Syntactics
syntactic structure
syntactic representations
syntactic representation
stylometry
stylistic levels
style-aware neural model
semantic structure
pubcrawl
part of speech tags
attention-based hierarchical neural network
neural nets
neural model
natural language processing
Metrics
lexical representations
Human behavior
encoding
document information
Computational modeling
composability
Blogs
Benchmark testing
benchmark datasets
authorship attribution
attribution
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 10:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Natural Spoken Instructions Understanding for Robot with Dependency Parsing
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
natural spoken instruction understanding
Robot
deep learning algorithms
benchmark ATIS task
dependency features
dependency parsing tree
FBM3
Filling
grammars
intent determination
Hidden Markov models
performance level
slot filling tasks
spoken instruction understanding module
spoken language understanding system
syntactic information
syntactic-based model
window vector
Cyber Dependencies
robots
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
neural nets
Labeling
machine learning
trees (mathematics)
Scalability
human-robot interaction
natural language processing
neural network
Syntactics
Human Factors
control engineering computing
Compositionality
speech processing
biblio
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
Fuzzy Hashing
WannaCryptor
WannaCry
Syntactics
SSDEEP
similarity preserving hashing
SDHASH
Ransomware
pubcrawl
pam
k-means
Indexes
Scalability
Engines
DIANA
Cryptography
composability
clustering methods
clustering
clara
agnes
Fuzzy Cryptography
Metrics
Resiliency
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
Proactive Secure Coding for iOS Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
operating systems (computers)
tools
Syntactics
static code analysis
static analysis
security of data
security
secure coding issues
secure APIs
Resiliency
resilience
proactive secure coding
iOS Security
iOS developers
iOS applications
ios
Human behavior
Force
encoding
Computer languages
composability
applications
application program interfaces
pubcrawl
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
search problems
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
optimizations
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
dynamic clone search approaches
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
Asm2Vec
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »