Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
resilience
Metrics
neural nets
neural network
neurophysiology
Noise
pubcrawl
representation patterns
representational similarity
medical image processing
Resiliency
Task Analysis
vision
visual perception
visual representation
Visual systems
visualization
white box cryptography
DNNs
Biological neural networks
biomedical MRI
black-box adversarial examples
brain
brain-inspired deep neural networks
complex level visual tasks
composability
computer vision
adversarial example
Facial animation
fMRI
Functional magnetic resonance imaging
functional magnetic resonance imaging study
high-level visual tasks
human performance
human vision
human visual system
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Research and Implementation of Intelligent Substation Information Security Risk Assessment Tool
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Metrics
tools
Task Analysis
Substations
substation automation
Security Risk Management
security of data
risk management
risk assessment tool
risk assessment platform
risk assessment engine
pubcrawl
Protocols
power system security
Intelligent Data and Security
intelligent substation information security risk assessment tool
intelligent substation
information security level
information security assessment method
information security
Industrial Control Systems
industrial control
Engines
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Risk Management as a Strategic Management Element in the Security System
Submitted by aekwall on Mon, 02/17/2020 - 2:27pm
uncertainty
strategic security management
strategic management element
Security Risk Management
security policy formation
science
Management
dynamic security environment
security management
security system
Risk
security
Economics
risk management
Metrics
pubcrawl
Resiliency
Task Analysis
Organizations
Scalability
security of data
biblio
Towards Virtual Agents for Supporting Appropriate Small Group Behaviors in Educational Contexts
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
educational contexts
Social Agents
virtual social demonstration games
virtual characters
virtual agents
verbal behaviors
teaching
social and emotional learning
Social & Emotional Learning
Small Groups
small group behaviors
serious games (computing)
Politeness
nonverbal behaviors
Scalability
Demonstration Games
computer aided instruction
collaborative social situations
information and communications technology
software agents
virtual reality
Human Factors
Games
information and communication technology
collaboration
Training
pubcrawl
Task Analysis
biblio
Social Action in Socially Situated Agents
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Evolution
Social Agents
traditional action
sociotechnical systems
Socio technical systems
socially situated agents
social self awareness
social action
shared world
Rivers
interacting systems
goal-rationality
evolutionary instability
Scalability
behavioural instability
social sciences
software agents
interactive systems
Human Factors
psychology
Interference
Mathematical model
multi-agent systems
Neurons
pubcrawl
Task Analysis
biblio
Micro-Kernel OS Architecture and its Ecosystem Construction for Ubiquitous Electric Power IoT
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
security
operating system kernels
POSIX standard API
power engineering computing
power systems
process based fine-grained real-time scheduling algorithm
pubcrawl
real-time OS
real-time systems
Resiliency
Scalability
scheduling
operating system
security mechanism design
security of data
service process binding
sigma0 efficient message channel
Task Analysis
Trusted Computing
Ubiquitous Computing Security
ubiquitous electric power Internet of Things
ubiquitous electric power IoT
Virtualization
Linux
Containers
ecosystem construction
embedded virtualization
functional security
Human Factors
information security
intelligent interconnection technology
intelligent NARI microkernel
Internet of Things
IoT
IoT OS
computer architecture
Linux Container
Made in China 2025
Metrics
microkernel
microkernel OS architecture
mimicry defense
multicore computing security
NARI microkernel OS
native process sandbox
network security
biblio
Keystroke Based User Authentication Using Modified Differential Evolution
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
Anomaly Detection
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamics
Metrics
Modified Differential Evolution
password
Presses
pubcrawl
Subspace Anomaly Detection
Task Analysis
timing
Training
user authentication
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
biblio
An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
Flooding Attack
Task Analysis
swarm optimization algorithms
Swarm Intelligence Optimization
Swarm intelligence algorithm
Swarm Intelligence
replay attack
pubcrawl
particle swarm optimization
particle swarm optimisation
optimization
numerical problems
Intrusion detection classifier
foraging characteristics
ABC algorithm
effective swarm optimization based intrusion detection classifier system
effective classifier
DoS attack
computer network security
Compositionality
composability
Communication Systems
cloud computing environment
Cloud Computing
Classification algorithms
Artificial Intelligence
artificial bee colony algorithm
Artificial Bee Colony
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »