Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Manuals
biblio
An analysis of ground truth binarized image variability of palm leaf manuscripts
Submitted by grigby1 on Wed, 03/08/2017 - 2:05pm
History
Variability
text analysis
Skeleton
pubcrawl170111
palm leaf manuscript images
Palm leaf manuscript
optimal binarization method
Measurement
Manuals
Image edge detection
Binarization
ground truthing process
Ground truth image
ground truth binarized image variability analysis
Frequency modulation
document image processing
document analysis system
cultural heritage
cultural differences
binarization evaluation metrics
biblio
An autonomic approach to extend the business value of a legacy order fulfillment system
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
software applications
Manuals
Monitoring
order fulfillment workflow
pubcrawl170107
retailing industry
self-adaptive systems
self-managing systems
service-oriented architecture
legacy software systems
software engineering
software evolution
software maintenance
Software systems
systems interoperability
systems of systems
third party security screening provider
enterprise resource planning
autonomic behavior
Autonomic computing
autonomic control loop design
autonomic software component
Business
business value
Complexity theory
Databases
autonomic approach
ERP systems
error-prone manual process
human error
human monitoring
hybrid systems
legacy multichannel commerce enterprise resource planning system
legacy order fulfillment system
biblio
PVCoherence: Designing flat coherence protocols for scalable verification
Submitted by BrandonB on Wed, 05/06/2015 - 2:39pm
Manuals
storage overhead
scalable verification
PVCoherence
Protocols
parametric verification
Parametric statistics
model checking
memory protocols
automated verification methodology
Guidelines
formal verification
flat coherence protocol
Concrete
Coherence
cache storage
cache coherence protocol
biblio
Ontology based approach for perception of network security state
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
automation
computer network security
computer networks
Hardware
Manuals
network operating system
network operating systems
Network Security Status
Network Situational awareness
Ontologies
ontologies (artificial intelligence)
Ontology
security
taxonomy
taxonomy classes
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 10:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
The rules of engagement for cyber-warfare and the Tallinn Manual: A case study
Submitted by BrandonB on Mon, 05/04/2015 - 2:40pm
Force
Tallinn Manual
standards
security of data
Protocols
Organizations
Manuals
Law
international law
Computer crime
cyber-warfare
Cyber-Terrorism
cyber-sabaotge
cyber-espionage
cyber-attacks
Cooperative Cyber Defence Centre of Excellence
Computers
biblio
Challenges pertaining to cyber war under international law
Submitted by BrandonB on Mon, 05/04/2015 - 2:38pm
Force
Tallinn Manual
Stuxnet
state-level cyber intrusion
security of data
Manuals
legal position
Law
international law
challenges
Estonia
cyberspace state-level intrusion
cyberspace intrusion
cyberspace governance
Cyberspace
cyber war
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
9