Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
predictability
biblio
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces
Submitted by aekwall on Tue, 04/27/2021 - 1:33pm
Scalability
encryption
security
Electronic mail
Resiliency
pubcrawl
Cryptography
tools
usability
Phishing
Security Heuristics
predictability
usable secure email
user interface design
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 11:29am
Human behavior
usability
tools
security
resilience
Metrics
malware
machine learning
Human Factors
Security Heuristics
Government
composability
Analytical models
Air gaps
pubcrawl
predictability
Scalability
Resiliency
biblio
Taxonomy-Based Intelligent Malware Detection Framework
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
Scalability
Resiliency
pubcrawl
Security Heuristics
predictability
biblio
Reinforcement Learning Based Multi-Tenant Secret-Key Assignment for Quantum Key Distribution Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
quantum cryptography
predictability
Security Heuristics
tenant-request blocking probability
quantum key distribution networks
online multitenant secret-key assignment algorithm
Benchmark testing
Heuristic algorithms
Artificial Neural Networks
Scalability
Training
Reinforcement learning
resource management
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Ares: Inferring Error Specifications through Static Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
program debugging
predictability
Security Heuristics
reliability flaws
error specification
error handling blocks
error handling
Ares
API-related defects
security
application program interfaces
program diagnostics
program testing
static analysis
pubcrawl
Resiliency
Scalability
security of data
biblio
Adaptive Network Management for Safety-Critical Systems
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
Bandwidth
predictability
Security Heuristics
Safety-Critical Systems
optimization algorithm
fault diagnosis
Dijkstra algorithm
complex network configurations
adaptive network management
Device-to-device communication
computer network reliability
timing
Safety
resilience
security
software-defined networking
telecommunication network routing
optimisation
optimization
Routing
pubcrawl
Resiliency
software defined networking
computer network management
telecommunication traffic
Scalability
computer network security
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
Temporal feature and heuristics-based Noise Detection over Classical Machine Learning for ECG Signal Quality Assessment
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
medical signal processing
wavelet
temporal features
SQA
signal quality
Security Heuristics
Scalability
Resiliency
pubcrawl
predictability
patient monitoring
classical machine learning
learning (artificial intelligence)
lead-5 signal
heuristics-based noise detection
heuristic rule
heuristic method
Electrocardiography
electrocardiogram
ECG signal quality assessment
classical machine learning method
« first
‹ previous
1
2
3
4
next ›
last »