Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
Metrics
Training
threat intelligence reports
threat intelligence
threat actors
text representation algorithm
text analysis
Text
Task Analysis
security literature
security analytics
security
pubcrawl
NLP
natural language processing
Information Reuse and Security
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
composability
classification
attribution
attack attribution
Resiliency
Compositionality
biblio
Adaptive and Intelligible Prioritization for Network Security Incidents
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
risk management
static calculations
prioritization model management
network security incidents
incident prioritization
adaptive learning
adaptive incident prioritization
Communication networks
Automated Response Actions
Anomaly Detection
automation
security of data
tools
composability
pubcrawl
Resiliency
network security
cyber security
Adaptation models
Task Analysis
security
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
What Do Developers Discuss about Biometric APIs?
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
Market research
application programming interface
system developers
sound biometric system
Neurotechnology
multiple implementation environments
Empirical Software Engineering
biometrics
biometric-based algorithms
biometric technology
biometric API-related posts
APIs misuse
Face
pubcrawl
Sorting
documentation
feature extraction
Compositionality
Task Analysis
biometrics (access control)
application program interfaces
APIs
Software
Resiliency
resilience
biblio
Invited Paper: AI-Based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies
Submitted by grigby1 on Thu, 08/13/2020 - 5:08pm
malicious participants
AI-based security design
artificial intelligence-based security solutions
denial of service
distributed sensing paradigm
energy-oriented DoS attack
Ensemble Techniques
illegitimate task requests
location-based DoS attack
Mobile handsets
MCS servers
MCS task legitimacy decisions
Mobile Crowdsensing
mobile crowdsensing systems
pointless energy consumption
smart mobile devices
artificial intelligence security
telecommunication security
learning (artificial intelligence)
security of data
security
machine learning
Servers
Artificial Intelligence
pubcrawl
computer network security
Internet of Things
batteries
privacy
sensor fusion
mobile computing
sensors
Denial of Service attacks
Task Analysis
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »