Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software packages
biblio
Modeling of quantum channel parameters impact on information exchange security
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Polarization
unauthorized access
software packages
Scalability
Resiliency
Quantum Key Distribution
quantum information exchange computer emulator
quantum computing security
quantum computing
quantum computer
quantum communication channel
quantum channel parameters impact modeling
quantum channel imperfections
Qt Creator C++ program package
pubcrawl
Protocols
adversary
photons
Photonics
Metrics
information security
information exchange security
Human behavior
Cryptography
cryptographic security
cryptanalysis
C++ language
authorisation
attenuation
attack on the protocol
Adversary Models
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Software reuse
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
pubcrawl
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
Android (operating system)
origin analysis
Information Reuse
Firefox source code
file clone detection
efficient file similarity computation
directory names
Debian Linux package
Debian GNU package
Data mining
Cryptography
component extraction
Cloning
clone-and-own reuse analysis
b-bit minwise hashing technique
Android source code
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
Metadata Discovery Problem
tools
standards
software packaging knowledge
software packages
software management
software engineering
software discovery
Scalability
Resiliency
querying package management tools
pubcrawl
program diagnostics
problem diagnosis
Packaging
Operational analytics
agile development practices
metadata
meta data
machine learning methods
licensing requirement compliance
learning (artificial intelligence)
filesystem tree introspection
file metadata
feature extraction
drift detection situations
Docker Images
data structures
Compositionality
Columbus
Cloud Computing
cloud
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
« first
‹ previous
1
2