Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Object recognition
biblio
Mathematical and Algorithmic Prevention of Biometric Data Leaks
Submitted by grigby1 on Tue, 06/14/2022 - 2:12pm
Identification
industrial plants
automation
biometric authentication
biometrics (access control)
biometric encryption
Random access memory
data storage
Metrics
encryption
Object recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
information security
biblio
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
Submitted by grigby1 on Thu, 06/09/2022 - 1:53pm
traffic control
ssh-attacks
cyber-threat intelligence
Resiliency
Cowrie
honey pots
honeypots
Malicious Traffic
Human Factors
botnet
Monitoring
password
Object recognition
internet
Scalability
resilience
pubcrawl
IP networks
Servers
biblio
Condensed Survey On Wearable IoBT Devices
Submitted by grigby1 on Thu, 06/09/2022 - 1:32pm
Data Security
transmission protocols
military systems
military
Human Factors
Wearable
medical devices
data fusion
iobt
soldier
pubcrawl
blockchain
military communication
Industries
Object recognition
Protocols
Scalability
Resiliency
resilience
biblio
Securing Remote Access Networks Using Malware Detection Tools for Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 10:39am
industrial control
scalable systems
remote access trojans
Rats
Purdue control hierarchy
operational technology
hash calculation
Availability
integrity
Object recognition
integrated circuits
malware detection
telecommunication traffic
Smart homes
Industrial Control Systems
confidentiality
Resiliency
Scalability
pubcrawl
tools
biblio
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 11:10am
information forensics
Actionable Cyber Threat Information
Autopsy
Compositionality
Conferences
Digital Forensics
Electronic mail
Incident Investigation
Information Reuse
Object recognition
Phishing
pubcrawl
Resiliency
security
STIX
tools
biblio
Research on Application of Radio Frequency Identification Technology in Intelligent Maritime Supervision
Submitted by grigby1 on Tue, 04/26/2022 - 9:36am
Big Data
data science
Deterrence
Human behavior
Internet of Things
Internet of Vessels
maritime supervision
Object recognition
pubcrawl
radio frequency identification
Radio navigation
resilience
Resiliency
Safety
Scalability
Transportation
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 10:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Research on Application of Chinese Natural Language Processing in Constructing Knowledge Graph of Chronic Diseases
Submitted by grigby1 on Thu, 03/10/2022 - 11:32am
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Medical services
Object recognition
Data mining
natural language processing
Knowledge engineering
education
Medical diagnostic imaging
knowledge graph
named entity recognition
Relationship extraction
biblio
Internet of things device recognition method based on natural language processing and text similarity
Submitted by grigby1 on Thu, 03/10/2022 - 11:31am
IoT
pubcrawl
Human behavior
resilience
Resiliency
performance evaluation
Scalability
Object recognition
Computers
natural language processing
Cyberspace
Text recognition
Fingers
IoT equipment detection
Jaccard
Text similarity
biblio
Digital data provenance for the power grid based on a Keyless Infrastructure Security Solution
Submitted by aekwall on Fri, 02/25/2022 - 9:46am
SCADA systems
Keyless security
ICs
historians
data-in-transit
data-at-rest
data provenance
Cybersecurity
Object recognition
Provenance
Fingerprint recognition
Software
power grids
blockchain
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
DLT
real-time systems
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »