Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
regression analysis
multiple regression
cross-correlation
confidence interval
information resources
Costs
Resiliency
Risk
threat
Predictive models
Fuzzy logic
Analytical models
resilience
Metrics
pubcrawl
security
information security
biblio
Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks
Submitted by grigby1 on Fri, 09/09/2022 - 2:23pm
Prediction algorithms
signal separation
overlapped frequency hopping signal
Fully Convolutional Networks
Resiliency
Time Frequency Analysis
Fourier transforms
Time-frequency Analysis
resilience
deep learning
Scalability
Metrics
pubcrawl
convolution
security
Predictive models
Training
biblio
A Security Analysis of Chinese Robot Supply Chain Based on Open-Source Intelligence
Submitted by grigby1 on Fri, 08/26/2022 - 1:21pm
pubcrawl
text analysis
supply chains
Sino-US game
security management
Scalability
robot supply chain
Risk
Resiliency
resilience
supply chain security
Predictive models
Open-Source Intelligence
machine learning algorithms
Human Factors
Human behavior
game theory
Control Theory
appraisal
biblio
Optimal Load Scheduling in Coupled Power and Transportation Networks
Submitted by aekwall on Fri, 08/26/2022 - 12:07pm
Predictive models
power systems
pubcrawl
Scalability
Resiliency
uncertainty
Voltage control
Transportation
coupled congestion control
demand forecasting
electric vehicle
electric vehicle charging
load scheduling
network congestion management
power and transportation networks
biblio
Towards Emotion-Aware Agents For Negotiation Dialogues
Submitted by aekwall on Fri, 08/26/2022 - 12:05pm
Computational modeling
computer architecture
deep learning
Predictive models
pubcrawl
Scalability
Metrics
Human behavior
Decision Making
conversational agents
Adaptation models
affective computing
emotion models
human-agent interaction
negotiation dialogues
outcome prediction
biblio
Active Learning to Improve Static Analysis
Submitted by aekwall on Fri, 08/12/2022 - 4:02pm
security
Predictive models
Training
tools
Resiliency
Human behavior
composability
Prediction algorithms
static analysis
pubcrawl
Forestry
active learning
biblio
Show Why the Answer is Correct! Towards Explainable AI using Compositional Temporal Attention
Submitted by aekwall on Fri, 08/12/2022 - 3:58pm
Benchmark testing
visualization
deep learning
Predictive models
Analytical models
Knowledge Discovery
cognition
pubcrawl
Compositionality
biblio
Machine Learning Computational Fluid Dynamics
Submitted by grigby1 on Wed, 08/10/2022 - 2:46pm
Predictive models
machine learning
Neural networks
pubcrawl
Computational modeling
composability
Compositionality
Fluids
computational fluid dynamics
computational intelligence
flow past a cylinder
fluid flow
fluid-structure interaction
numerical analyses
Partial differential equations
biblio
AI-Assisted Risk Based Two Factor Authentication Method (AIA-RB-2FA)
Submitted by grigby1 on Mon, 08/01/2022 - 2:44pm
Predictive models
security
Monitoring
pubcrawl
Human behavior
Human Factors
authentication
Data models
Artificial Intelligence
usability
two-factor authentication
two factor authentication
risk-based authentication
biblio
Static Analysis of Source Code Vulnerability Using Machine Learning Techniques: A Survey
Submitted by grigby1 on Thu, 07/28/2022 - 2:07pm
static code analysis
Analytical models
composability
feature extraction
Human behavior
machine learning
machine learning algorithms
Market research
Predictive models
pubcrawl
resilience
Resiliency
software security
source code vulnerability
static analysis
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »