Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time measurement
biblio
Distributed Denial of Service Attack Mitigation Using High Availability Proxy and Network Load Balancing
Submitted by grigby1 on Tue, 09/07/2021 - 3:23pm
denial-of-service attack
Web servers
Time measurement
resilience
quality of service
pubcrawl
Load management
Linux
Internet security
internet
HAProxy
threat mitigation
ddos mitigation
DDOS attacks detection
DDoS attack mitigation
DDoS
Cybersecurity
composability
Human behavior
Metrics
Resiliency
biblio
Efficiency Metrics and Test Case Design for Test Automation
Submitted by grigby1 on Mon, 08/02/2021 - 3:38pm
automation
automation measurements and metrics
Helsenorge
Ice
Measurement
Metrics
metrics testing
Portals
pubcrawl
Stakeholders
Task Analysis
test automation
Time measurement
biblio
LBS-based location privacy protection mechanism in augmented reality
Submitted by grigby1 on Fri, 07/02/2021 - 5:26pm
uncertainty
Trajectory
Time measurement
Size measurement
Scalability
Resiliency
resilience
pubcrawl
privacy metrics
privacy
Mobile handsets
Location-based service
location privacy protection
Human behavior
Entropy
augmented reality
biblio
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods
Submitted by aekwall on Tue, 05/18/2021 - 3:18pm
Metrics
test platform
software vulnerability detection
evaluation method
Compositionality
vulnerability detection
Indexes
testing
tools
security
pubcrawl
Human behavior
Resiliency
information security
Linux
Time measurement
Software
biblio
PASAPTO: Policy-aware Security and Performance Trade-off Analysis–Computation on Encrypted Data with Restricted Leakage
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Cryptography
Decision trees
Heuristic algorithms
Java
optimization
policy-based governance
pubcrawl
security policies
Time measurement
biblio
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
Metrics
Trusted Computing
trusted boot
Time measurement
security of data
security
Resiliency
resilience
pubcrawl
Benchmark testing
measurement uncertainty
malware
hypothesis testing benchmark
Hardware
embedded systems
Embedded System
composability
boot sequence
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
A Stochastic Assessment of Attacks based on Continuous-Time Markov Chains
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
probability
trees (mathematics)
Transient analysis
Time measurement
stochastic propagation times
Stochastic processes
stochastic methodology
stochastic assessment
Statistical performance evaluation
sequential attack
security of data
Scalability
Resiliency
resilience
pubcrawl
attack propagation
Petri nets
performance evaluation
Markov processes
individual attack occurrence probabilities
cyber-physical systems
Cyber-physical attack
critical infrastructures
critical infrastructure
continuous-time Markov chains
Conferences
concurrent attack
Chained Attacks
basic attack tree
attack trees
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
« first
‹ previous
1
2
3
4
5
6
next ›
last »