Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Using of an anonymous communication in e-government services: In the prevention of passive attacks on a network
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
government data processing
telecommunication security
security
Resiliency
resilience
Receivers
pubcrawl
Protocols
policy-based governance
passive attacks prevention
networking
network attacks
Monitoring
anonymous communication
Electronic government
e-government services
E-Government
digital participation
Delta
Data protection
Cybersecurity
communication technologies
Communication networks
commerce
collaboration
auctions
biblio
Vulnerability Severity Prediction With Deep Neural Network
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
standard cross site scripting vulnerability text data
deep neural networks
network security incidents
XSS vulnerability
false negative rate
huge economic losses
multiple deep learning methods
optimal CNN network
recurrent convolutional neural networks
Deep Neural Network
text classification
TextRCNN
vulnerability risk levels
vulnerability severity prediction
vulnerability text classification evaluation
vulnerability text information
Cross Site Scripting
computer network security
recurrent neural nets
convolution
Communication networks
text categorization
convolutional neural nets
machine learning
Neural networks
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
security
Scalability
network security
biblio
Research on Cognitive Linkage of Network Security Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
cognition
weak linkage ability
network security equipment
cognitive linkage system model
Cognitive Linkage
Cognitive Cycle
network security devices
computational intelligence
Couplings
Decision Making
Compositionality
security of data
Communication networks
Policy
Analytical models
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
security
Cryptography
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
low power consumption
WMN
wireless mesh networks
Wireless Mesh Network Security
wireless
telecommunication security
security
Resiliency
resilience
pubcrawl
Protocols
mesh support capability
MESH network
ad-hoc networking technologies
Human behavior
cyber physical systems
Cyber Physical System
composability
Communication networks
bluetooth security
Bluetooth low energy mesh network technology
bluetooth low energy
Bluetooth
BLE security protocols
BLE mesh network security mechanisms
BLE
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
Multi-Attacking Strategy on Smart Grid with Incomplete Network Information
Submitted by grigby1 on Fri, 08/28/2020 - 12:03pm
Power measurement
Voltage measurement
telecommunication networks
state estimation
smart power grids
Smart Grid
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system operator
power system
attack vector
power engineering computing
Phasor measurement units
network information technology
multiattacking strategy
Multi-Attack
Load flow
injected false data attack
IEEE 14 bus system
Human behavior
cyber-attacks
Communication networks
Attack vectors
biblio
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
cognition
Autonomic Security
strong relevant logic
reasoning method
industrial control network security analysis
Industrial control network
forward reasoning
formal logic
industrial control network system
inference mechanisms
industrial control
computer network security
Security analysis
Communication networks
computer security
decision-making
Decision Making
Production
composability
pubcrawl
Resiliency
biblio
Adaptive and Intelligible Prioritization for Network Security Incidents
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
risk management
static calculations
prioritization model management
network security incidents
incident prioritization
adaptive learning
adaptive incident prioritization
Communication networks
Automated Response Actions
Anomaly Detection
automation
security of data
tools
composability
pubcrawl
Resiliency
network security
cyber security
Adaptation models
Task Analysis
security
biblio
Research on Security Self-defense of Power Information Network Based on Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:06pm
power system
artificial intelligence security
self-defense research
self-defense
power information network security
network security attack
defense drills
security level
Clustering algorithms
power system stability
Monitoring
network security
information networks
Communication networks
power system security
power engineering computing
electricity
computer network security
pubcrawl
Artificial Intelligence
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 3:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »