Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Subspace constraints
biblio
A Testing Method for Object-oriented Program based on Adaptive Random Testing with Variable Probability
Submitted by aekwall on Fri, 07/29/2022 - 4:26pm
Measurement
Conferences
pubcrawl
Metrics
Resiliency
composability
Software algorithms
software quality
Costs
adaptive random testing
Object-oriented Program
Probability density function
Subspace constraints
object oriented security
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
A deep learning approach to trespassing detection using video surveillance data
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
Railroad security
Deep Neural Network
dual-stage ARTS architecture
dual-stage deep learning architecture
early warning prediction techniques
high fidelity trespass classification stage
inexpensive pre-filtering stage
potential trespassing sites
public domain surveillance data
deep convolutional neural networks
railroad trespassing activity
safety risks
Subspace constraints
surveillance
Trespassing detection
video processing
video surveillance data
deep video
convolutional neural nets
computer architecture
machine learning
pubcrawl
Metrics
Resiliency
resilience
learning (artificial intelligence)
deep learning
Scalability
Neural networks
video surveillance
Detectors
activity detection
automated railroad trespassing detection system
background subtraction
CNN-based deep learning architecture
computer vision
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems