Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
electronic commerce
biblio
Digital Signature with Message Security Process
Submitted by grigby1 on Thu, 06/29/2023 - 11:02am
encryption
pubcrawl
resilience
Resiliency
Scalability
authentication
digital signature
Reliability
Receivers
decryption
digital signatures
hash
RSA algorithm
electronic commerce
SHA
biblio
Topic Modeling for Cyber Threat Intelligence (CTI)
Submitted by grigby1 on Fri, 04/28/2023 - 2:51pm
cyber threat intelligence
threat recommendation
Maryam
application security
electronic commerce
topic modeling
OWASP
computational intelligence
Informatics
Cryptography
natural language processing
Compositionality
composability
Computational modeling
pubcrawl
security
Computer hacking
biblio
A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy
Submitted by grigby1 on Tue, 09/20/2022 - 1:12pm
similarity
false trust
entropy weight method
trust model
collaborative filtering
Resiliency
electronic commerce
KNN
recommender systems
Predictive models
Measurement
History
Entropy
Computational modeling
Scalability
resilience
policy-based governance
pubcrawl
biblio
Designing Embodied Virtual Agent in E-commerce System Recommendations using Conversational Design Interaction
Submitted by aekwall on Fri, 08/26/2022 - 11:03am
user experience
virtual agent
User-Centered Design
system recommendation
natural conversational framework
e-commerce
conversational design interaction
and usability testing
User centered design
usability
data privacy
electronic commerce
conversational agents
faces
Prototypes
Human behavior
Metrics
Scalability
pubcrawl
biblio
Injection Shilling Attack Tool for Recommender Systems
Submitted by grigby1 on Fri, 07/15/2022 - 11:19am
recommender systems
tool
Shilling Attack
Fake user
collaborative filtering
Collaborative Filter
Attack Type
electronic commerce
user interfaces
tools
Resistance
Databases
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cross-Site Scripting (XSS) and SQL Injection Attacks Multi-classification Using Bidirectional LSTM Recurrent Neural Network
Submitted by aekwall on Tue, 04/19/2022 - 10:27am
RNN
Cross Site Scripting
BiLSTM
XSS
SQL injection
web security
cross-site scripting
passwords
electronic commerce
deep learning
LSTM
Recurrent neural networks
Human behavior
Resiliency
Scalability
pubcrawl
feature extraction
Training
biblio
T-PKI for Anonymous Attestation in TPM
Submitted by aekwall on Tue, 01/25/2022 - 2:50pm
public key cryptography
Transient analysis
tpm
TCG
Quantum safe
lattice cryptography
anonymity
attestation
electronic commerce
security
composability
Human behavior
Resiliency
pubcrawl
Conferences
cloud
Cloud Computing
biblio
Phishing Detection Using Machine Learning Technique
Submitted by aekwall on Mon, 11/08/2021 - 2:23pm
password
Support vector machines
machine learning
pubcrawl
privacy
standards
Phishing
Credit cards
electronic commerce
principal component analysis
support vector machine
Web
threat vectors
Measurement
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
1
2
3
next ›
last »