Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
A K-nearest neighbor locally search regression algorithm for short-term traffic flow forecasting
Submitted by grigby1 on Mon, 06/11/2018 - 3:44pm
nearest neighbour methods
traffic flow vector
traffic flow data
traffic control
Silicon
short-term traffic flow forecasting
search problems
root mean squared error
road traffic
regression analysis
Real-Time Traffic Control
real-time systems
pubcrawl
Predictive models
Prediction algorithms
optimal nearest neighbors
Baoanbei intersection
nearest neighbor search
Metrics
Measurement
mean square error methods
locally search strategy
local similarity
k-NN model
k-nearest neighbor locally weighted regression algorithm
K-nearest neighbor locally search regression algorithm
k-nearest neighbor
k-LSR algorithm
Indexes
forecasting theory
forecasting
data-driven method
biblio
Detection of malicious nodes in NDN VANET for Interest Packet Popple Broadcast Diffusion Attack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
packet popple broadcast diffusion attack
Vehicular Ad-hoc Network
vehicular ad hoc networks
telecommunication security
Scalability
Roads
Resiliency
resilience
pubcrawl
Predictive models
Ports (Computers)
PBDA
Analytical models
next generation networks
NDN VANET
named data networking
Named Data Network Security
Mitigation strategy
Markov processes
markov chain
internet
Interest Packet Popple Broadcast Diffusion Attack
Human behavior
biblio
Predicting Signatures of Future Malware Variants
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
malware detection systems
Vaccines
Training
significant scientific development
signature based defense
security of data
Scalability
Resiliency
resilience
pubcrawl
Predictive models
malware evolution
Clustering algorithms
malware defense
malware
learning (artificial intelligence)
invasive software
History
future malware variants
future malware signatures
future family developments
feature extraction
defensive system
biblio
A Computational Model for Improving the Accuracy of Multi-Criteria Recommender Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:10pm
Measurement
user modelling
user modeling technique
single rating collaborative filtering technique
similarity
Scalability
Resiliency
resilience
recommender systems
pubcrawl
Predictive models
neural nets
multicriteria recommender systems
multicriteria recommendations
Multi-criteria recommendation
modeling approaches
Adaptation models
Human Factors
Human behavior
highly distributed self-organizing structures
criteria ratings
Computational modeling
computational model
collaborative filtering
collaboration
biologically inspired algorithms
biological neurons
Biological neural networks
average similarity techniques
Artificial Neural Networks
aggregation function approach
adaptive self-organizing structures
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Assessing Software Supply Chain Risk Using Public Data
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
software supply chain risk assessment
Robustness
safety-critical software
Scalability
secure networking library
security
security of data
sigmoid cumulative vulnerability discovery function
Software
risk management
software vulnerability discovery
supply chain management
supply chain risk
supply chain security
supply chains
temporary plateau feature
tools
vulnerability discovery
open source project
AML
commercial government organizations
cumulative vulnerability discovery plot
cybersecurity risk
Databases
Human behavior
national vulnerability database
NVD
Alhazmi-Malaiya Logistic model
open version control data
OpenSSL
Predictive models
pubcrawl
public data
resilience
Resiliency
biblio
Vulnerability prediction through self-learning model
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
self-learning model
Vulnerability prediction
Vulnerability impact
vulnerability detection
Training
Software Vulnerability
software reliability
software fault tolerance
software fault
software development phase
software defect
Software algorithms
Software
Activation Function
Resiliency
pubcrawl
Predictive models
neural nets
Metrics
Mathematical model
learning (artificial intelligence)
Human behavior
Compositionality
Artificial Neural Networks
artificial neural network
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
biblio
An Adversary-Centric Behavior Modeling of DDoS Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:58pm
industrial mitigation operation
Scalability
Resiliency
resilience
pubcrawl
Predictive models
Monitoring
Metrics
malware
internet
Adversary Models
Human behavior
feature extraction
distributed denial of service attack
DDoS attack model
Data-driven approach
computer network security
Computer crime
Analytical models
adversary-centric behavior model
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
next ›
last »