Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Knowledge engineering
biblio
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
soft failures
optimization
Power Grid
power grids
power system faults
pubcrawl
recovery schedule
rescue missions
resilience
Resiliency
network recovery
software defined networking
Software Defined Networks
software-defined networking
System recovery
telecommunication network reliability
telecommunication network routing
telecommunication scheduling
telecommunication security
uncertainty
large-scale failures
communication infrastructure
Communication Network
Communication networks
congested links
disruptive routing framework
failure locations
failure recovery
interdependent networks
Knowledge engineering
Cascading Failures
maintenance engineering
Massive Disruption
massive failures
Monitoring
multiple interconnected networks
multistage recovery approach
natural disasters
Network Monitoring
network monitoring techniques
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by aekwall on Mon, 10/28/2019 - 9:39am
provenance-based trust reasoning
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
cognitive systems
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
trust
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
security of data
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
biblio
Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
pubcrawl
wireless sensor networks
wireless mesh networks
Wireless communication
Traffic flow
telecommunication security
single-layer defenses
sensors
Routing protocols
Routing
route manipulation attack
resilience
cognitive radio
off-sensing and route manipulation attack
Metrics
Knowledge engineering
individual network layers
FCC
cross-layer routing protocols
cross-layer attack
cross-layer assault
CR-based wireless mesh networks
composability
cognitive radio based wireless mesh networks
biblio
Constructing Supply Chains in Open Source Software
Submitted by grigby1 on Mon, 12/03/2018 - 12:51pm
Knowledge engineering
knowledge flow
Metrics
open source
Open Source Software
Production facilities
pubcrawl
resilience
Resiliency
risk management
Scalability
software supply chain
supply chain risk assessment
supply chains
tools
biblio
Security modalities on linear network code for randomized sources
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
randomized sources
network coding
number random symbols
optimally secure information transmission
Peer-to-peer computing
pubcrawl
r-secure
random keys
random source symbols
randomized source messages
Metrics
resilience
Resiliency
Secure network code
security
security constraints
security modalities
telecommunication security
weakly secure
wiretapped network
information symbols
composability
computational security
Conferences
cryptographic measure
Cryptography
encoding
illegitimate users
imperfectly secure
information rate
adversaries
information theoretic approach
information theoretic security bounds
Knowledge engineering
linear codes
linear network code
linear network coding scheme
Mathematical model
maximized information transmission
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
False data injection attacks on power system state estimation with limited information
Submitted by el_wehby on Mon, 05/14/2018 - 3:07pm
Generators
Knowledge engineering
Noise measurement
optimization
power systems
state estimation
Voltage measurement
1449080
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Multi-agent based intrusion prevention and mitigation architecture for software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
multi-agent system
Topology
Software Defined Networks
Software
security
Resiliency
real-time systems
pubcrawl
network topology
composability
Metrics
Knowledge engineering
Intrusion Detection
Human behavior
DDoS Attack Prevention
DDoS
computer architecture
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »