Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
security
weighted software network
vulnerable software modules
vulnerable classes
vulnerability prediction models
Software systems
software system
software security testing
Software Security Metrics
software metrics
security of data
Complexity theory
secure software building
secure communications software
public security vulnerabilities
pubcrawl
program testing
predictive security metrics
Predictive models
prediction model
Metrics
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 10:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
insider threat
robust technique
Resiliency
resilience
remuneration
relational databases
relational database systems
relational database security
Relational Database
real time monitoring technique
pubcrawl
Predictive models
mitigating technique
Metrics
Knowledgebase
insiders accesses
threat mitigation
insider collusion threat prediction
information security
Human behavior
discovered collusion insider threat
database schema
database management systems
database architect
Data dependencies
Computer hacking
composability
Collusion Threat
collusion insider attacks
collaboration
Cloud Computing
authorisation
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
biblio
On Detecting Manifestation of Adversary Characteristics
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
Adversary characteristics
Adversary Models
Communication system security
computer security
Data models
Human behavior
machine learning
Metrics
Predictive models
pubcrawl
Resiliency
risk-averse
Scalability
tools
Training
Wireless communication
biblio
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
CDN logs
video popularity prediction
user generated videos
scattered caches
RESTful Web services
quality of service
prediction services
NoSQL databases
NoSQL database
k-means clustering prediction model
highly variable UGV popularity
end-user content delivery network requests
end-user behaviour
dynamic model training
cloud-based CDN
Cloud Computing
analytics as a service architecture
pattern clustering
web services
Web Caching
cache storage
computer architecture
Training
Streaming media
Scalability
Resiliency
Metrics
pubcrawl
Analytical models
Predictive models
biblio
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
Predictive models
resilience
pubcrawl
Metrics
composability
Training
Adaptation models
Neural networks
Perturbation methods
Image reconstruction
noise reduction
White Box Security
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »