Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Resiliency
x64-based Linux platform
W ⊕ X security model
Task Analysis
security of data
security
scratch registers
scratch register
Scalability
ROP malicious code
rop attacks
ROP attack
Return-oriented Programming attacks
return oriented programming
return instructions
binary instrumentation
Registers
pubcrawl
programming
parameter registers
object-oriented programming
malware
Linux
Kernel
Instruction sets
Human behavior
composability
code reuse attack
calling convention
biblio
Blockchain Based Provenance Sharing of Scientific Workflows
Submitted by aekwall on Mon, 09/23/2019 - 10:41am
Human behavior
transaction verification
tools
Task Analysis
scientific workflow provenance
scientific workflow
scientific information systems
Resiliency
Reliability
pubcrawl
Provenance
Metrics
metadata
blockchain
experiments backtracking
experiment reproducibility verification
experiment reproducibility
distributed scientists
distributed research cooperation
Distributed databases
data providers
cryptocurrencies
computer architecture
composability
centralized provenance sharing architectures
blockchain based provenance sharing
biblio
Fine-Grained Provenance for Matching ETL
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
provenance APIs
data provenance tools
data science tasks
data types
data warehouses
database provenance tools
database-style provenance techniques
matching computations
matching tasks
Provenance
data objects
provenance-driven troubleshooting tool
PROVision
Record linking
support optimization
track provenance
tuple-level provenance
workflow
workflow management software
workflow provenance systems
Data mining
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
ETL
tools
data analysis
Task Analysis
database management systems
application program interfaces
Instruments
Semantics
algebra
arbitrary code
code versions
common ETL
biblio
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review
Submitted by Katie Dey on Fri, 09/13/2019 - 11:35am
Task Analysis
robotics
Metrics
human-machine teaming (HMT)
Human Factors
Benchmarking
autonomous system
robots
computer architecture
collaboration
Benchmark testing
human computer interaction
Measurement
benchmark HMT
Performance Metrics
metric classification
metric identification
human-machine teaming
benchmark human-machine teams
team working
pattern classification
Man-machine systems
Human Machine Teaming
C3E 2019
biblio
Information Assurance in modern ATE
Submitted by aekwall on Mon, 08/05/2019 - 10:40am
Instruments
tools
Task Analysis
software footprint
security of data
security
Resiliency
pubcrawl
policy-based governance
operating systems (computers)
operating system
microsoft windows
Metrics
internet
anti-virus
Information Assurance
Human behavior
electronic devices
cyber security
Computers
computer viruses
computer
composability
automatic test equipment
ATE system software
ATE OS settings
ATE
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
operating system kernels
tools
Task Analysis
self-adaptive heuristic security mechanism
security of data
security issues
Security Audits
security
Scalability
resource-sensitive events
resource auditor
Resiliency
resilience
pubcrawl
Operating systems security
KLRA
kernel level resource auditing tool
kernel level
Kernel
IoT operating system security
iot operating system
IoT device
Internet of Things
Human Factors
Human behavior
Hardware
data privacy
biblio
Energy Demand Scheduling Based on Game Theory for Microgrids
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Resiliency
Minimization
modern grids
opportunity
optimisation
optimization
policy-based governance
pubcrawl
renewable energy sources
minimal interactions
scheduling
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
Task Analysis
total energy cost
electricity grids
constrained optimization problem
consumer demand management
consumers
consumption scheduling
demand side management
demand-side management systems
distributed energy demand scheduling approach
distributed power generation
Buildings
energy consumption
game theory
Human behavior
interesting challenges
Metrics
Microgrids
minimal information exchange
biblio
One-Shot Learning Approach for Unknown Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
neural nets
Word2Vec
unknown malware classification
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
one-shot learning network
one-shot learning approach
One-shot learning
Neural Turing Machine
Neural networks
Adaptation models
network systems
natural language processing
Metrics
memory augmented neural network
malware classification
malware behavior
malware API calls sequence
malware
Least Recently Used Access
learning (artificial intelligence)
invasive software
intelligent protection systems
Human behavior
fewshot learning
API Sequence
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »