Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Artificial Intelligence
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Failure Disposal by Interaction of the Cross-Layer Artificial Intelligence on ONOS-Based SDON Platform
Submitted by aekwall on Mon, 09/21/2020 - 2:36pm
Artificial Intelligence
Cross Layer Security
software defined optical network
Open Network Operating System
ONOS-based SDON platform
failure disposal
cross-layer artificial intelligence
control layer
AI engines
composability
telecommunication control
software defined networking
Engines
optical fibre networks
Optical fiber networks
data layer
Databases
optimization
pubcrawl
Resiliency
feature extraction
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 3:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
Invited Paper: AI-Based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies
Submitted by grigby1 on Thu, 08/13/2020 - 4:08pm
malicious participants
AI-based security design
artificial intelligence-based security solutions
denial of service
distributed sensing paradigm
energy-oriented DoS attack
Ensemble Techniques
illegitimate task requests
location-based DoS attack
Mobile handsets
MCS servers
MCS task legitimacy decisions
Mobile Crowdsensing
mobile crowdsensing systems
pointless energy consumption
smart mobile devices
artificial intelligence security
telecommunication security
learning (artificial intelligence)
security of data
security
machine learning
Servers
Artificial Intelligence
pubcrawl
computer network security
Internet of Things
batteries
privacy
sensor fusion
mobile computing
sensors
Denial of Service attacks
Task Analysis
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
An Analytical Framework for Security-Tuning of Artificial Intelligence Applications Under Attack
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
artificial intelligence applications
artificial intelligence security
signal classification
security-tuning
perturbation attack
parameters tuning
ML parameters
ML experts
ML algorithms
medical signal processing
k-nearest neighbors algorithm
input data perturbation attack
electroencephalography
electroencephalogram signals
EEG dataset
data classification
learning (artificial intelligence)
analytical framework
AI application
classification accuracy
tuning
testing
Prediction algorithms
Perturbation methods
machine learning algorithms
optimization
pubcrawl
Artificial Intelligence
security
machine learning
security of data
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »