Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 3:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
biblio
Mathematical Modeling of Group Authentication Based on Isogeny of Elliptic Curves
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
message authentication
Task Analysis
Scalability
Resiliency
quantum computing
public key cryptography
pubcrawl
Protocols
postquantum systems
Metrics
authentication
mathematical modeling
isogeny graphs
Isogeny
hierarchical group authentication scheme
graph theory
Elliptic curves
Elliptic curve cryptography
Complexity theory
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
A CAPTCHA recognition technology based on deep learning
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
feedforward neural nets
Training
Task Analysis
security of data
security breaches
pubcrawl
multitask joint training model
Multi task joint training
model recognition
license plate recognition
learning (artificial intelligence)
image recognition
human-machine distinction technology
Human behavior
handwriting recognition
Adaptation models
feature extraction
deep learning
convolutional neural network model
convolutional neural network
convolution
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
character recognition
captchas
CAPTCHA recognition technology
CAPTCHA
automatic malicious program attack
adaptive learning rate
biblio
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
mobile agent system
Trusted Platfrom Modules
trusted platform modules
tpm
Task Analysis
software agents
software agent usage approach
security of data
security mechanisms
security experts
secure protocol
Resiliency
pubcrawl
Protocols
mobile agents
agent based system builders
malicious host
Java agent development framework
Java
JADE
Hardware Protection
eminent scientific community
Data processing
Cryptography
Conferences
computing problems
computing paradigm
composability
Agent Protection
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
Cyber-Physical System Checkpointing and Recovery
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
CPS resilience
checkpointing
cyber physical systems
cyber-physical systems
delays
Protocols
pubcrawl
recovery
resilience
Resiliency
security
Synchronization
System recovery
Task Analysis
biblio
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier’s Perspective)
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
swarm
online learning
performance evaluation
Protocols
resource-constrained embedded devices
resource-efficient smart broadcast authentication scheme
smart devices
Software
software integrity checking
malware detection
Task Analysis
Trusted Party
WISE
Resiliency
Human behavior
pubcrawl
composability
fine-grained multiclusters
computer network security
Scalability
Internet of Things
attestation
Hardware
Remote Attestation
attack surface
Cryptographic Protocols
security
heterogenous IoT networks
History
intelligent swarm attestation protocol
interactive protocol
Internet of Things (IoT)
IoT applications
lightweight intelligent swarm attestation scheme
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »