Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Artificial Intelligence
biblio
Machine Learning for Network Resiliency and Consistency
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
global overview
software defined networking
security system
security
SDN
Resiliency
resilience
pubcrawl
programmable networking
network resiliency
network resilience
network consistency
network configurations
machine learning
learning (artificial intelligence)
adaptability
flow tables
feature extraction
deep learning architectures
deep learning
data privacy
convolutional neural networks
convolutional neural nets
consistency verification system
consistency test scenario
computer architecture
artificial intelligence resiliency system
Artificial Intelligence
ARS
biblio
Implementation of Searchable Encryption System with Dedicated Hardware and Its Evaluation
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
database management systems
shared database
searchable encryption system
Medical services
Hardware Implementation
encrypted data
dedicated hardware
symmetric searchable encryption
public key encryption with keyword search
Big Data
personal information
searchable encryption
Artificial Intelligence
Cryptography
composability
Resiliency
pubcrawl
resilience
biblio
Unethical Research: How to Create a Malevolent Artificial Intelligence
Submitted by willirn1 on Tue, 09/24/2019 - 10:48am
Cognitive Security
Cognitive Security in Cyber
Artificial Intelligence
Malevolent Artificial Intelligence
unethical research
biblio
IoT Enabled Robots with QR Code Based Localization
Submitted by aekwall on Mon, 09/23/2019 - 9:47am
sensor data
Protocols
pubcrawl
QR code
QR code detection
QR code landmark recognition
QR codes
Resiliency
Robot sensing systems
Path Planning
Servers
Service robots
shortest path computation
smart devices
SSHv2 protocol
wireless LAN
wireless local area network
Artificial Intelligence
Path optimization
mobile robots
IoT enabled robots
IoT devices
Internet of Things
indoor navigation
indoor localization
heading measurements
Floors
Floor Mapping
encrypted communication channel
Dijkstras algorithm
cyber physical systems
Cryptography
control engineering computing
biblio
Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception
Submitted by willirn1 on Fri, 09/20/2019 - 3:29pm
Cognitive Security
Cognitive Security in Cyber
AI
Artificial Intelligence
game theory
critical network functions
cyber deception
biblio
Human-Machine Teaming Systems Engineering Guide
Submitted by Katie Dey on Thu, 09/12/2019 - 4:25pm
autonomous systems
Artificial Intelligence
complex systems engineering
machine learning
Social Behavior
innovation
Theory of Minds
Human Machine Teaming
C3E 2019
biblio
To Detect Fake News, This AI First Learned to Write it
Submitted by willirn1 on Wed, 09/11/2019 - 9:31am
AI
Articles of Interest
Artificial Intelligence
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Deepfakes
fake news
Cognitive Security
Articles of Interest
C3E 2019
biblio
The National Security Challenges of Artificial Intelligence, Manipulated Media, and 'Deepfakes'
Submitted by willirn1 on Wed, 09/11/2019 - 9:19am
Articles of Interest
Artificial Intelligence
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Deepfakes
National security
Cognitive Security
Articles of Interest
C3E 2019
biblio
Can AI help to end fake news?
Submitted by willirn1 on Tue, 09/10/2019 - 2:26pm
AI
Articles of Interest
Artificial Intelligence
C3E 2019
Cognitive Security
Cognitive Security in Cyber
fake news
Cognitive Security
Articles of Interest
C3E 2019
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:57am
security
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
PAMP
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
Immune system
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
nodes act
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »