Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Business
biblio
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
intelligent transportation system stakeholders
Vehicular cloud
security selection criteria
security of data
security criteria
Resiliency
pubcrawl
Metrics
Memory
IoT-based smart city
Internet of Vehicles
Internet of Things
Intelligent Transportation Systems
Business
Human Factors
Human behavior
Evaluation and Selection
encryption
data transfer
data privacy
data exchange
cyber physical systems
context-based analysis pattern
computer architecture
cloud-based vehicular cloud
Cloud Computing
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
PCI DSS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
cloud-bases POS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
testing
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
security of data
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 12:21pm
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
PRETSA
sensitive information
security of data
Scalability
Resiliency
resilience
pubcrawl
pseudonymized employee information
process model discovery
process execution
process discovery
privacy-disclosure attacks
Privacy-aware Process Mining
privacy-aware process discovery
privacy guarantees
privacy
Analytical models
Personnel
performance-annotated process model
Information systems
Human Factors
Human behavior
event log sanitization
event data
differential privacy
Data Sanitization
data privacy
Data mining
data deletion
Compositionality
business data processing
Business
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
real-time requirements
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
cyber breaches
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
Anomaly Detection
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
security of data
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
methodology
Software Architecture
Security Properties
security of data
security
Resiliency
resilience
reference architecture-based methodology
pubcrawl
operational security services
object-oriented programming
object oriented security
Metrics
architecture
ISO standards
IoT-enabled applications
IoT systems
IoT
Internet of Things
IEC standards
ERAMIS methodology
design features
computer architecture
composability
complexity
Business
biblio
Design and Implementation of a New Intelligent Substation Network Security Defense System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
power system security
Networked Control Systems Security
protection demand
network security protection level
intelligent substation network security risk
intelligent substation network security protection
intelligent substation network security defense system
defense system
intelligent substation
Predictive Metrics
Power system protection
defense mechanism
Monitoring
Communication networks
Substations
Business
composability
pubcrawl
Resiliency
network security
real-time systems
Protocols
security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »