Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyberspace
biblio
A Visual Analysis Framework of Attack Paths Based on Network Traffic
Submitted by grigby1 on Tue, 01/11/2022 - 10:34am
Metrics
visualization
Time series analysis
telecommunication traffic
security
Scalability
Resiliency
resilience
pubcrawl
Attack fingerprint
Lethality assessment
Fingerprint recognition
feature extraction
Cyberspace
Backtracking
Attack Visualization
attack surface
biblio
A Network Asset Detection Scheme Based on Website Icon Intelligent Identification
Submitted by grigby1 on Mon, 01/10/2022 - 4:56pm
internet
website icon
Training
security
Resiliency
resilience
pubcrawl
network asset
Metrics
Manuals
Artificial Intelligence
Human behavior
detection
Cyberspace
cyber security
computer science
composability
Communications technology
artificial intelligence security
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 3:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
Contextual Privacy Policy Modeling in IoT
Submitted by grigby1 on Tue, 10/12/2021 - 2:53pm
IoT Privacy Taxonomy
taxonomy
smart buildings
Scalability
pubcrawl
Privacy Policy
Privacy Policies
Privacy Formalization
privacy
Context
IoT
Internet of Things
Intelligent sensors
Human behavior
data privacy
Cyberspace
cyber-physical systems
Context modeling
biblio
A Method to Construct Vulnerability Knowledge Graph Based on Heterogeneous Data
Submitted by grigby1 on Tue, 10/12/2021 - 2:45pm
composability
computer security
Cyberspace
Databases
Error analysis
Knowledge engineering
Metrics
multi-source heterogeneous databases
Ontologies
power grid vulnerability
power grid vulnerability analysis
pubcrawl
Resiliency
sensors
vulnerability knowledge graph
vulnerability ontology
biblio
A Semantic Model-Based Security Engineering Framework for Cyber-Physical Systems
Submitted by grigby1 on Wed, 07/28/2021 - 8:46am
Complexity theory
Computing Theory
Couplings
cyber-physical systems
Cyberspace
embedded systems
Internet of Things
Metrics
Model-based Security Engineering
pubcrawl
security
Security Evaluation
security metric
Security Metrics
Security Scoring
Semantics
biblio
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
Submitted by aekwall on Thu, 05/13/2021 - 11:35am
security
attack surface
Resiliency
pubcrawl
Metrics
Redundancy
Web servers
Cyberspace
Heuristic algorithms
Scalability
Scheduling algorithms
scheduling algorithm
Symbiosis
time continuous
biblio
A Benchmark of Security Metrics in Cyber-Physical Systems
Submitted by grigby1 on Tue, 04/27/2021 - 3:59pm
Measurement
metrics testing
benchmark
Benchmark testing
Conferences
cyber-physical systems
Cyberspace
Metrics
process control
pubcrawl
security
Security analysis
Security Metrics
system security
System-of-Systems
biblio
A Security Qualification Matrix to Efficiently Measure Security in Cyber-Physical Systems
Submitted by aekwall on Mon, 02/08/2021 - 1:39pm
Qualifications
threat analysis
smart manufacturing
Smart Grids
Security Scoring
Security Qualification Matrix
Security Metrics
security metric
Scalability
Resiliency
security
pubcrawl
Microelectronics
Metrics
Human Factors
Cyberspace
cyber-physical systems
Cyber Dependencies
Compositionality
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »