Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pagerank
biblio
Concurrency Analysis of Go and Java
Submitted by grigby1 on Tue, 06/01/2021 - 1:43pm
Java
pagerank
matrix multiplication
Go
Concurrency
Concurrent computing
Instruction sets
Web pages
Task Analysis
security
Libraries
Benchmark testing
composability
Resiliency
resilience
Metrics
pubcrawl
biblio
UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
Submitted by aekwall on Tue, 06/01/2021 - 12:27pm
Microprogramming
UEFI
Trusted Computing
state transition graph
security
Resiliency
pubcrawl
pagerank
network theory (graphs)
Computing Theory
Human Factors
Computing Theory and Trust
Computational modeling
composability
Bayesian networks
Bayes methods
Analytical models
trust
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Finding Local Experts for Dynamic Recommendations Using Lazy Random Walk
Submitted by aekwall on Mon, 10/12/2020 - 10:32am
data privacy
dynamic recommender algorithm
Expert Systems and Privacy
FourSquare shopping data sets
Human behavior
Human Factors
lazy random walk
local expert
pagerank
pubcrawl
recommender systems
Scalability
social contacts interactions
Statistics
statistics based privacy-aware recommender systems
top-rank shopping places
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 10:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
Metrics
Web sites
unsolicited e-mail
Uniform resource locators
security of data
security
Resiliency
resilience
pubcrawl
phishing sites
Phishing Detection
phishing attacks
Phishing
pagerank
online banking passwords
bank account details
Membership functions
malicious website
legitimate websites
indexing
global security
Fuzzy logic
fraudulent websites
Fraudulent
Electronic mail
Defuzzification
Data mining
Computer crime
Classification algorithms
Bars
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection
biblio
Semantics-aware Graph-based Recommender Systems Exploiting Linked Open Data
Submitted by grigby1 on Thu, 05/18/2017 - 1:20pm
adaptive filtering
diversity
Feature Selection
graph-based recommender systems
graphs
Human behavior
Kerberos
linked open data
Metrics
pagerank
pubcrawl
Resiliency