Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Radio frequency
biblio
Behavioral Malware Classification Using Convolutional Recurrent Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
Metrics
Training
static signature
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
Radio frequency
pubcrawl
privacy
Prefetching
pattern classification
Microsoft Windows Prefetch files
microsoft windows
anti-virus systems
malware classification
malware
invasive software
Human behavior
feature extraction
convolutional recurrent neural networks
convolutional neural nets
computer viruses
behavioral malware detection
behavioral malware classifiers
behavioral malware classification
anti-virus vendor naming schemes
biblio
Method of Textual Information Authorship Analysis Based on Stylometry
Submitted by grigby1 on Fri, 02/22/2019 - 3:02pm
natural language processing
Ukrainian scientific texts
textual information authorship analysis
text content monitoring
text analysis
stylometry technologies usage
stylometry
stop words
statistical linguistic analysis
reference text fragment
Radio frequency
pubcrawl
Porter stemming algorithm (Porter stemmer)
Porter stemmer
NLP methods
author publications
Monitoring
Metrics
linguometry
Linguistics
linguistic analysis
information retrieval
Indexes
Human behavior
glottochronology
formal approach
Dictionaries
Correlation
Content analysis
computational linguistics
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Multi-Band Acoustic-Wave-Lumped-Element Resonator-Based Bandstop Filters with Continuously Tunable Stopband Bandwidths
Submitted by grigby1 on Wed, 01/16/2019 - 1:28pm
enhancement
tuning
surface acoustic-wave (SAW) resonator
Scattering parameters
RF/micro-wave filter
Resonators
Resonator filters
Radio frequency
high-quality-factor filter
pubcrawl
bandstop filter (BPF)
Band-pass filters
Acoustic-wave (AW) filter
Surface acoustic waves
acoustic coupling
Scalability
Resiliency
Human behavior
biblio
Immunity assessment of a servomotor exposed to an intentional train of RF pulses
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
intentional interference
susceptibility
smart intentional electromagnetic interference
Servomotors
servomotor
robots
robotics
RF pulses
Resiliency
resilience
radio frequency pulses
Radio frequency
pubcrawl
Off-The-Shelf servomotor
intentional train
automated production lines
industrial process
Induction motors
immunity assessment
functional safety
EMC
Electromagnetics
electromagnetic interference
electromagnetic fields
electromagnetic field
electromagnetic compatibility
DC motors
Damage Assessment
cyber-attacks
biblio
Impact of Remanent Magnetic Field on the Heat Load of Original CEBAF Cryomodule
Submitted by grigby1 on Wed, 05/16/2018 - 12:49pm
remanence
Magnetic shielding
Magnetometers
Niobium
original CEBAF cryomodule
pubcrawl
quality factor
Radio frequency
refurbished cryomodule C50-12
Magnetic Remanence
remanent magnetic field
residual magnetic fields
resilience
Resiliency
superconducting resonators
Temperature sensors
Tuners
electron accelerators
cold magnetic shield
cold tuner
Compositionality
continuous electron beam accelerator facility
cool-down procedures
cryogenic testing
Cryomodules
cryostats
Cavity resonators
five-cell cavity
flux-gate magnetometers
fluxgate magnetometers
He tank
heat load
Magnetic field measurement
magnetic fields
biblio
Software Defined Radio Based Mixed Signal Detection in Spectrally Congested and Spectrally Contested Environment
Submitted by grigby1 on Wed, 04/11/2018 - 1:54pm
Software
Resiliency
RF signal component
RF signals
Scalability
SCF cyclostationary feature
SDR based implementation
second order spectrum correlation function cyclostationary fea- ture
security
signal detection
signal generators
resilience
software defined radio based mixed RF signal generator
software defined radio based mixed signal detection
software radio
spectrally congested environment
spectrally contested environment
symbol rate
telecommunication security
time domain analysis
Time Frequency Analysis
Time-frequency Analysis
initial phase offset
cyber physical systems
cyber security application
cyclostationary domain analysis
Detectors
frequency domain analysis
frequency-domain analysis
Generators
graphical user interface
graphical user interfaces
GUI
carrier frequency
initial time delay
Metrics
mixed signal detection
modulation
multiple signal
parameter estimation
pubcrawl
pulse shaping filter
Radio frequency
biblio
Random forest explorations for URL classification
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
Phishing
Web sites
URL classification
unsolicited e-mail
Uniform resource locators
Training
testing
Random forest explorations
Radio frequency
pubcrawl
phishing Websites
blacklisting
pattern classification
machine learning algorithms
learning (artificial intelligence)
internet
Human Factors
Human behavior
feature extraction
Computer crime
common defence users
Classification algorithms
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Bandwidth
Cognitive Radio Security
Interference
Jamming
pubcrawl
Radio frequency
Resiliency
security
sensors
Wireless communication
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »