Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insert
biblio
Analytics at Scale: Evolution at Infrastructure and Algorithmic Levels
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
component
relational database security
Tutorials
styling
style
insert
formatting
Technological innovation
data analysis
Scalability
relational databases
quality of service
composability
Production
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
component
insider threat
object detection
styling
style
insert
formatting
Recurrent neural networks
Metrics
deep learning
real-time systems
composability
performance evaluation
policy-based governance
Human behavior
pubcrawl
feature extraction
Predictive models
biblio
Enhanced Security Level for Sensitive Medical Data Transmitted through Visible Light
Submitted by aekwall on Tue, 05/10/2022 - 1:45pm
wireless sensor networks
Protocols
medical devices
encryption
Wireless communication
pubcrawl
Scalability
Metrics
Resiliency
styling
Algorithm
Cipher
insert
Optical design
Optical fiber networks
Visible Light Communications Security
biblio
Analysis on Solid Protection System of Industrial Control Network Security in Intelligent Factory
Submitted by grigby1 on Wed, 03/02/2022 - 1:53pm
Intelligent manufacturing industrial control network industrial control security
styling
style
security
resilience
Production facilities
process control
Networked Control Systems Security
Metrics
manufacturing
Loss measurement
Industrial Control Systems
insert
information security
formatting
Economics
composability
Scalability
scalable systems
Resiliency
pubcrawl
biblio
A Study on Machine Learning based Conversational Agents and Designing Techniques
Submitted by aekwall on Tue, 09/07/2021 - 11:16am
Data models
deep learning
pubcrawl
Scalability
Metrics
Human behavior
chatbot
conversational agents
component
formatting
insert
style
styling
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
An Improved Method for Generating Biometric-Cryptographic System from Face Feature
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
encryption
feature extraction
pubcrawl
Metrics
Resiliency
Scalability
component
resilience
Face
Biomedical imaging
biometric encryption
Facial features
formatting
insert
style
styling
biblio
Trust Structure in Public Key Infrastructures
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
pubcrawl
Trusted Computing
trust structure
styling
style
Servers
Semantics
security augmentation
Scalability
Resiliency
public key infrastructure
public key cryptography
Public key
authentication
privacy
PKI Trust Models
PKI
Metrics
intelligent algorithms
insert
Human Factors
Human behavior
generic PKI model
formatting
certification
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE