Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Proposals
biblio
An evaluation of region based object detection strategies within X-ray baggage security imagery
Submitted by grigby1 on Thu, 06/07/2018 - 3:03pm
security
policy-based governance
Policy-Governed Secure Collaboration
Proposals
pubcrawl
R-CNN/R-FCN variants
region based object detection
resilience
Resiliency
ResNet-101
Policy
sliding window driven CNN approach
SWCNN
Task Analysis
transfer learning
VGG16
Weapons
X-ray baggage security
X-ray baggage security imagery
X-ray imaging
image classification
cluttered X-ray security imagery
collaboration
convolution
cyber physical systems
deep learning
Faster Region-based CNN
feature extraction
first-stage region proposal
Fully Convolutional Networks
class firearm detection problem
ImageNet dataset
learning (artificial intelligence)
Metrics
microsoft windows
neural nets
neural networks security
object class X-ray detection problem
object detection
object localization strategies
biblio
Optimized event notification in CAN through in-frame replies and Bloom filters
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
event-driven systems
timing
real-time systems
protocol
Proposals
Payloads
optimized event notification
Media Access Protocol
in-frame replies
access protocols
Electronic mail
distributed medium access control mechanism
data structures
controller area networks
CAN XR
Bloom filters
asynchronous medium access control mechanism
1646317
biblio
A comparison of CNN-based face and head detectors for real-time video surveillance applications
Submitted by K_Hooper on Wed, 04/04/2018 - 9:55am
computer architecture
Convolutional NNs
Detectors
Face
Face detection
feature extraction
Head Detection
Human behavior
Proposals
pubcrawl
Resiliency
Scalability
video surveillance
biblio
Run-Time Attack Detection in Cryptographic APIs
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
proof-of-concept log analysis tool
Wrapping
tools
standards
sensitive cryptographic keys
security of data
security API
run-time attack detection
Resiliency
resilience
pubcrawl
Proposals
APIs
PKCS\#11
Monitoring
key-management attacks
key security
financial infrastructures
Cryptography
cryptographic services
cryptographic API
critical infrastructures
Compositionality
application program interfaces
biblio
Exogenous Connectors for Hierarchical Service Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
orchestration
web services
visualization
total compositionality
Software Architecture
service-oriented systems
service-oriented architecture
Sequential analysis
Scalability
pubcrawl
Proposals
choreography
MusicCorp
microservices
message passing
hierarchical service composition
explicit control flow
exogenous connectors
Distributed databases
Connectors
Compositionality
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
biblio
SDN Security Plane: An Architecture for Resilient Security Services
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
SDN security plane
pubcrawl
real-time user-defined security
remotely controlled network
Resiliency
Resilient Security Architectures
resilient security services architecture
SDN
SDN controller
SDN security design
Proposals
SDN switches
Security plane
security-related data exchange
software defined networking
telecommunication control
telecommunication switching
third party agent
third party software module
data plane
centralised control
centralized control
computer architecture
Computer crime
computer network performance evaluation
computer network security
control plane
control systems
data packet forwarding
Agent
DDoS Attack Prevention
DDoS Attacks
IP networks
network communications
network performance
network security features
OpenFlow
Ports (Computers)
biblio
Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
pubcrawl
Human behavior
Human Factors
composability
CAPTCHA
captchas
distortion
Proposals
Semantics
Speech
Speech recognition
usability
human beings
biblio
Feature selection to detect botnets using machine learning algorithms
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
ISCX repositories
Training
testing
Servers
Resiliency
pubcrawl
Proposals
pattern classification
Metrics
malware detection
machine learning algorithms
machine learning
learning (artificial intelligence)
ISOT repositories
botnet
invasive software
genetic algorithms
genetic algorithm
Feature Selection
feature extraction
feature evaluation
Compositionality
command and control systems
command and control
C4.5 algorithm
C&c
botnets
Botnet detection
file
Notes and Links for 2017 Aspiring PIs Workshop Talk by Jonathan Sprinkle
Submitted by sprinkle on Thu, 08/03/2017 - 11:59pm
CPS Domains
Automotive
Control
Transportation
Foundations
Proposals
Traffic flow
collaborative control
Session 5
Session 5
Presentation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »