Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Object recognition
biblio
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:58pm
middleware
tactical networks
sensors
Scalability
Resiliency
resilience
pubcrawl
process control
open systems
Object recognition
network management
multiforce environment
multiforce cooperation
multi-robot systems
military systems
battlefield scenarios
machine learning
IoT
iobt
interoperable control
interoperability
Internet of Things
Internet of battlefield things
innovative solutions
innovative paradigm
Human Factors
heterogeneous IoBT devices
Bridges
Big Data
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 1:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
A Template Matching Background Filtering Method for Millimeter Wave Human Security Image
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
bilateral filtering
adaptive filtering
traditional filtering method
template matching background filtering method
template matching
objects identification
Object recognition
millimetre wave imaging
millimeter wave security image
millimeter wave human security inspection
millimeter wave human security image
Level Set Segmentation
level set algorithm
image details
human body area
Scalability
background noise
background area
adaptive template
actual millimeter wave image
matched filters
set theory
image matching
image denoising
image segmentation
filtering theory
Metrics
pubcrawl
Resiliency
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
Metrics
DDoS attack detection
resource IoT devices
machine learning based detection
machine learning (ML)
distributed denial of service attacks
Distributed Denial of Service (DDoS) attack
denial of service (dos)
comprehensive detection method
common malicious attacks
IoT networks
DDoS Defense
Object recognition
machine learning
Computer crime
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Support vector machines
performance evaluation
Internet of Things (IoT)
Internet of Things
computer network security
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »