Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Feeds
biblio
An improved N-grams based Model for Authorship Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
improved N-grams based model
Text processing
text classification
text categorization
text analysis
statistical distributions
similarity functions
pubcrawl
PAN benchmarks
N-grams model
N-gram
Metrics
anonymous text
Human behavior
Feeds
Euclidian distance
Dictionaries
corresponding author
Computational modeling
composability
automobiles
authorship attribution
attribution
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Initial Weights Optimization Using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network Applied to Spam Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Enhanced Step Size Firefly
feed forward neural network
Feeds
Human behavior
Human Factors
Initial Weight Optimization
Metrics
Neural networks
Neurons
optimization
pubcrawl
Scalability
Social network services
spam detection
Training
Uniform resource locators
biblio
An Intrusion Detection System using Opposition based Particle Swarm Optimization Algorithm and PNN
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
probability
Probabilistic Neural Network
OPSO
NSL KDD dataset
intrusion detection models
IDS model
feedforward neural net algorithms
Feed Forward Network
artificial neural network
ANN
NSL-KDD dataset
Compositionality
feedforward neural nets
Biological neural networks
Artificial Neural Networks
security of data
Intrusion Detection
Feeds
Neurons
Swarm Intelligence
particle swarm optimization algorithm
particle swarm optimization
particle swarm optimisation
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
network security
intrusion detection system
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Mon, 04/30/2018 - 3:09pm
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
Security Metrics
security
reputation metrics design
reputation metrics
regression analysis
pubcrawl
phishing datasets
Computer crime
Metrics
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Security and trust for surveillance cameras
Submitted by K_Hooper on Wed, 02/28/2018 - 11:32am
abstract vulnerabilities
attacks
Cameras
commercial IP camera
Compositionality
Feeds
IP networks
pubcrawl
security
security of data
standards
surveillance
surveillance cameras
telecommunication security
trust relationships
video surveillance
« first
‹ previous
1
2
3
next ›
last »