Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Object recognition
biblio
Tracking Browser Fingerprint using Rule Based Algorithm
Submitted by grigby1 on Thu, 05/20/2021 - 11:33am
online privacy
Web Browser Security
Stability analysis
stability
Software
signal processing
Rule Based Algorithm
Resiliency
resilience
pubcrawl
browser fingerprint
Object recognition
Metrics
Human behavior
Fingerprint recognition
Entropy
diversity
Compositionality
Browsers
biblio
SCAFFISD: A Scalable Framework for Fine-Grained Identification and Security Detection of Wireless Routers
Submitted by aekwall on Mon, 05/03/2021 - 12:09pm
Prototypes
wireless networks
wireless network
Vulnerability
security
Router Systems Security
router
Resiliency
pubcrawl
Scalable Security
privacy
Predictive Metrics
performance evaluation
Object recognition
Device Identification
Communication system security
access point
biblio
Quantifying Security and Performance of Physical Unclonable Functions
Submitted by grigby1 on Tue, 04/27/2021 - 3:00pm
Cryptography
Entropy
Hardware
Hashing Function
Integrated circuit modeling
Measurement
Metrics
Object recognition
Performance
Physical Unclonable Function
Physical Uncloneable Function
pubcrawl
security
Security Metrics
similarity
tools
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
IoT Kill Chain
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Probabilistic logic
privacy
Predictive models
Object recognition
attack surface
Internet of Things
Cyber Kill Chain
Chained Attacks
botnets
botnet
Attacks on IoT Devices
Attack Structure
Metrics
biblio
Response Time Analysis for Explainability of Visual Processing in CNNs
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
explainable artificial intelligence methods
visual processing
visual learning tasks
variable RTs
response times
MSDNet
model architecture
intrascene object-object relationships
hierarchical representations
early-exit architecture
dynamic inference models
conditional computation model
cognitive psychology
CNNs
Scalability
xai
Semantics
Syntactics
visualization
Object recognition
Analytical models
convolutional neural nets
Grammar
Computational modeling
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Enhanced Image Edge Detection Methods for Crab Species Identification
Submitted by grigby1 on Mon, 02/08/2021 - 1:01pm
resilience
Image Segmentation Methods
Industrial applications demand Image
Laplace equations
Laplacian of Gaussian
Metrics
morphological operations
Object recognition
Otsu Segmentation
Prewitt Operator
pubcrawl
image segmentation
Resiliency
Robert Operator
Robert operators
sample images
Scalability
security
Sobel operator
Sobel operators
spurious edges
Thresholding (Imaging)
edge detection
automatic image analysis
automatic object recognition
biological applications demand Image
Canny edge detection
Communication networks
composability
conducted analysis
crab images
crab species identification
digital image processing application
aspiring research areas
edge detection operators
Enhanced Image edge detection methods
enhanced prewitt operator
enhanced robert operator
feature extraction
image classification
image data
Image edge detection
image enhancement
biblio
Does visual search by neck motion improve hemispatial neglect?: An experimental study using an immersive virtual reality system
Submitted by grigby1 on Wed, 02/03/2021 - 12:09pm
privacy
VR Evaluation System
visualization
virtual reality
Unilateral Spatial Neglect
Three-dimensional displays
Space exploration
resilience
pubcrawl
immersive systems
Object recognition
object detection
Neck
Human Factors
Human behavior
Exploratory Ability
cyber physical systems
composability
biblio
Research on Neural Networks Integration for Object Classification in Video Analysis Systems
Submitted by grigby1 on Mon, 01/11/2021 - 12:59pm
Scalability
neural networks integration
object classification
object detection
Object recognition
outdoor video surveillance cameras
pubcrawl
resilience
Resiliency
neural nets
TensorFlow
video analysis
video analysis system
video cameras
video signal processing
video surveillance
video surveillance system
convolutional neural networks
network training
network architectures
moving objects detection
Metrics
Keras integration
Keras developer-friendly environment
Keras
image sequences
image sequence
image motion analysis
image classification
false detections
direct Python script execution techniques
deep video
Deep Neural Network
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »