Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
Measurement
statistical analysis
statistic metrics
state of charge
stability
security of data
pubcrawl
power engineering computing
NeuralWare software
neural network SOC prediction
neural network
neural nets
metrics testing
Metrics
air pollution control
greenhouse gas emission policies
EV BMS cyber security
EV batterys state of charge
Electric Vehicles
electric vehicle market
electric vehicle
cyber security threat
cyber security
BP NN
battery testing
battery testers
Backpropagation
back propagation neural network training
biblio
Embedded Software Fault Prediction Based on Back Propagation Neural Network
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
metrics testing
Training
statistical analysis
software testing activities
software metrics
software fault tolerance
Software
pubcrawl
program testing
nonlinear fitting ability
Neurons
neural nets
back propagation neural network
Metrics
Measurement
formal verification
filter metric set
fault prediction
embedded systems
embedded software fault prediction
embedded software
Correlation
Biological neural networks
Backpropagation
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
PHP
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
software vulnerabilities
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
Computer bugs
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Scalability
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
biblio
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
Homomorphic encryption
Computing Theory and Privacy
statistical measures
secure multi-party computation
product cost optimisation
privacy-preserving benchmarking systems
Oblivious transfer
key performance indicators
key figure comparison
cloud-based privacy-preserving benchmarking
cloud-based KPI comparison
cloud-based
benchmarking system
Benchmarking
software performance evaluation
Cloud Computing
Privacy-preserving
Benchmark testing
Complexity theory
statistical analysis
Companies
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
encryption
Cryptography
Scalability
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
biblio
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
computer network security
Scalability
Resiliency
pubcrawl
statistical analysis
Compromised Switches
middlebox-bypass attack
probe-based methods
service function chaining
Service Function Chaining (SFC)
SFC
statistics-based methods
Chained Attacks
biblio
Mathematical Methods Applied for Authorship Attribution on the Phonological Level
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
mathematical methods
text analysis
statistical methods
statistical analysis
Speech recognition
speech processing
Software
Reliability
pubcrawl
phonological level
natural language processing
Metrics
attribution
Linguistics
Java
hypothesis method
Human behavior
Frequency conversion
consonant phoneme group
composability
complex analysis method
authorship attribution
authorial text differentiation
authorial differentiation of texts
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »