Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software algorithms
biblio
Construction of immersive scene roaming system of exhibition hall based on virtual reality technology
Submitted by grigby1 on Mon, 05/23/2022 - 3:58pm
Three-dimensional displays
Roam
Immersive scene
Exhibition hall
Immersive experience
VR
education
Media
immersive systems
pubcrawl
Solid modeling
Software algorithms
composability
privacy
Heuristic algorithms
Resiliency
Human Factors
Human behavior
biblio
Mitigating unsecured data forwarding related attack of underwater sensor network
Submitted by grigby1 on Fri, 05/06/2022 - 4:25pm
malicious node
Unsecure data forwarding
UnetStack
Underwater Sensor Network
attacks and their mitigation approaches
location awareness
Underwater Networks
underwater communication
Tsunami
security
data communication
Scalability
Software algorithms
Metrics
wireless sensor networks
Resiliency
resilience
pubcrawl
biblio
DDoS Attack Detection and Mitigation in SDN using Machine Learning
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Metrics
Support vector machines
software defined networking
Software algorithms
security
Scalability
Resiliency
resilience
Radio frequency
pubcrawl
Attack detection
machine learning
Human behavior
feature extraction
Feature Extending
denial-of-service attack
DDoS attack mitigation
composability
attack mitigation
biblio
Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Computing Theory
Security Metrics
codes
machine learning
Measurement
Metrics
pubcrawl
security
Software algorithms
software metrics
static analysis
static code analysis
tools
vulnerability detection
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 1:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Securing SCADA Systems against Cyber-Attacks using Artificial Intelligence
Submitted by grigby1 on Mon, 03/14/2022 - 12:38pm
Time series analysis
GRU
FNN
DBN
Bi-LSTM
SCADA Systems Security
RNN
AI
Technological innovation
ML
IDS
machine learning algorithms
Artificial Neural Networks
SCADA
Software algorithms
Compositionality
SCADA systems
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
biblio
Learning-Based Fuzzing of IoT Message Brokers
Submitted by grigby1 on Fri, 02/25/2022 - 1:35pm
Software algorithms
stateful fuzzing
model inference
conformance testing
active automata learning
learning automata
MQTT
middleware security
Software systems
security
fuzzing
Manuals
composability
Protocols
collaboration
policy-based governance
pubcrawl
IoT
biblio
Performance comparison and optimization of mainstream NIDS systems in offline mode based on parallel processing technology
Submitted by grigby1 on Tue, 02/22/2022 - 1:41pm
Multicore processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
parallel processing
Software algorithms
Instruction sets
multicore computing security
network intrusion detection
System performance
NIDS
data science
performance comparison
Snort2
Snort3
Suricata
biblio
Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques
Submitted by aekwall on Mon, 01/10/2022 - 12:52pm
machine learning
Support vector machines
support vector machine (SVM)
software-defined network (SDN)
Software algorithms
Software
security
pubcrawl
Predictive Metrics
machine learning algorithms
SDN security
Human behavior
Distributed Denial of Service (DDoS)
denial-of-service attack
Decision trees
Decision Tree
composability
Attack vectors
Resiliency
Scalability
biblio
Research on Malware Variant Detection Method Based on Deep Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
Metrics
Virtualization
Software algorithms
sandbox
Resiliency
resilience
pubcrawl
policy-based governance
operating systems
Neural networks
Neural Network Security
virtualization privacy
malware
malicious code
Industrial Information Security
cyber physical systems
convolutional neural network
convolution
control systems
collaboration
Artificial Neural Networks
artificial neural network
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »