Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Pipelines
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
Hardware Trojan Insertion and Detection in Asynchronous Circuits
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
neural network
Trojan horses
trojan horse detection
Trojan detection methods
synchronous hardware Trojan
supply chain security
Routing
Resiliency
resilience
Random Forest
pubcrawl
Pipelines
asynchronous circuit
logic design
Latches
hardware Trojan threats
hardware Trojan insertion
hardware trojan
Hardware
delays
deep learning
cyber physical systems
asynchronous hardware Trojan circuits
asynchronous circuits
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
biblio
Research on stress detection technology of long-distance pipeline applying non-magnetic saturation
Submitted by aekwall on Mon, 09/30/2019 - 10:07am
Magnetic domains
surface remanence signals
stress detection technology
stress detection method
stress concentration region
stress analysis
remanence signal
remanence
pubcrawl
Pipelines
nonmagnetic saturation state
nonmagnetic saturation environment
magnetic saturation
Magnetic Remanence
magnetic domain model
long-distance pipeline
long-distance oil
gas pipeline
finite element method
finite element analysis
ferromagnetic materials
composability
cyber physical systems
Internet of Things
Compositionality
Resiliency
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Cross-Modal Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
Predictive Metrics
visualization
Visual Re-ranking
style transfer
Semantics
Scalability
Resiliency
resilience
pubcrawl
convolutional neural networks
Pipelines
neural style transfer
Multi-Modal
Metrics
image retrieval
Euclidean distance
Data mining
Cross-Modal
biblio
Addressing Security Challenges in Industrial Augmented Reality Systems
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
privacy
wireless networking
Streaming media
Smart industry
security risks
security of data
security goals
security challenges
security assets
security
Scalability
Resiliency
resilience
pubcrawl
productive applications
augmented reality
Pipelines
Mobile handsets
Industry 4.0 augmented reality
Industry 4.0
Industries
industrial augmented reality systems
industrial AR applications
human-machine communication
Human behavior
edge computing
distributed computing
contemporary AR applications
Cameras
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »