Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Viruses (medical)
biblio
Smart Door System with COVID-19 Risk Factor Evaluation, Contactless Data Acquisition and Sanitization
Submitted by grigby1 on Tue, 04/12/2022 - 11:17am
Data Sanitization
UV-C sanitization
face mask
contactless temperature measurement
contactless data collection
automatic hand sanitizer
automatic door
Arduino Uno
COVID-19
Viruses (medical)
lighting
faces
Data collection
Temperature measurement
Raspberry Pi
Compositionality
composability
Protocols
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
WebSecAsst - A Machine Learning based Chrome Extension
Submitted by grigby1 on Mon, 01/31/2022 - 4:40pm
data privacy
Xgboost
SHAP
Chrome Extension
Viruses (medical)
web security
Web Browser Security
Phishing
Compositionality
Browsers
machine learning
Data models
Software
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
pubcrawl
Windows system
Windows Operating System Security
Windows operating system
Viruses (medical)
software engineering
security technology
security
Resists
Resiliency
resilience
composability
Microsoft Windows (operating systems)
Metrics
Instruments
Information age
file viruses
file virus infection
dynamic binary instrumentation
computer viruses
computer virus infection
computer virus detection
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
machine learning
Viruses (medical)
situational awareness
Resiliency
resilience
relevant network security situation assessment algorithms
quantitative evaluation
qualitative evaluation
pubcrawl
neural network
network security
Metrics
advanced artificial intelligence deep learning technology
learning (artificial intelligence)
Indication System
deep learning
Cyberspace
cyber range network security indication system
cyber range
computer security
computer network security
composability
Artificial Intelligence
biblio
Run-time Detection and Mitigation of Power-Noise Viruses
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
data corruptions
multicore computing security
voltage noise data
voltage emergencies
Viruses (medical)
Threshold voltage
system crashes
run-time system
run-time estimation
resonance detection
power-noise virus mitigation
power-noise virus detection
power-noise attacks
power viruses
operating frequency
multicore microprocessors
security
Arm multicore processor
Resonant frequency
multiprocessing systems
Microprocessors
Benchmark testing
computer viruses
system-on-chip
microcontrollers
regression analysis
Metrics
pubcrawl
Resiliency
power aware computing
Scalability
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
Designing virus-resistant networks: A game-formation approach
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
optimal network topology
worst-case Nash equilibrium
Viruses (medical)
virus-resistant network design
virus security
virus resiliency
telecommunication network topology
Stability analysis
security
pubcrawl170108
pubcrawl170107
price of anarchy
Peer-to-peer computing
autonomous system
network topology
Nash Equilibrium
Nash equilibria
internet
global optimum
Games
game-formation approach
game theory
decentralized fashion
computer viruses
computer network security