Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
cyber threat intelligence
security
Scalability
pubcrawl
Organizations
monetary value
market capitalization
Human behavior
financial data processing
exchange breach
Ecosystems
attacks
cyber security threats
cyber security breaches
cyber security
cryptocurrency exchanges
cryptocurrencies
Computer crime
Bitcoin market value
Bitcoin exchange platforms
bitcoin
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
Trustworthy AI Development Guidelines for Human System Interaction
Submitted by aekwall on Mon, 02/01/2021 - 11:38am
human trust
user trust
trustworthy AI research area
trustworthy AI development guidelines
Trustworthy AI
marine safety
Human System Interactions
human system interaction
Human Machine Interactions
explainable AI
AI-based systems
AI system life cycle
AI Life Cycle
Organizations
transparency
user interfaces
Guidelines
Artificial Intelligence
testing
optimization
Robustness
pubcrawl
Human behavior
Data models
Trusted Computing
biblio
Anon-ISAC: Anonymity-preserving cyber threat information sharing platform based on permissioned Blockchain
Submitted by grigby1 on Thu, 01/28/2021 - 2:02pm
anonymity
blockchain
composability
computer security
Cybersecurity
Electrical Engineering
Human behavior
information management
IoT
Metrics
Organizations
privacy
pubcrawl
Public key
resilience
Resiliency
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 1:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by aekwall on Mon, 01/18/2021 - 11:33am
neural nets
Fuzzy Cryptography
privacy preserving techniques
health sectors
fuzzy logic membership functions
autoencoder
privacy breach
stored data
hospitals
health care
Biological neural networks
Fuzzy logic
security
Autoencoder Neural Network
Metrics
privacy
pubcrawl
Resiliency
Organizations
electronic health records
data privacy
Cryptography
Scalability
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »