Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 4:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 4:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Decision support systems
artificial intelligence security
warfighters
US Intelligence Community
unstructured text
summarization
sensemaking
public prize challenge
public administration
policymakers
ODNI-OUSD(I) xpress challenge
national security decision support
National security
machine analytics
intelligence community
pubcrawl
decision support
artificial intelligence techniques
analytic product
natural language processing
uncertainty
Government
Artificial Intelligence
Task Analysis
integrated circuits
composability
Resiliency
Metrics
Human behavior
biblio
A Generalized SDN Framework for Optical Wireless Communication Networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
Cameras
Visible Light Communications Security
VLC
underwater optical wireless communication
optical wireless communication networks
Optical Wireless Communication
optical spectrum
Optical fiber networks
optical camera communication.
optical camera communication
massive data traffic
LiFi
generalized SDN framework
general software defined networking structure
free space optical communication
free-space optical communication
internet
optical links
optical transmitters
optical receivers
visible light communication
light fidelity
telecommunication traffic
software defined networking
Wireless communication
Task Analysis
Protocols
Scalability
Resiliency
Metrics
pubcrawl
security
biblio
Edge Caching for Enriched Notifications Delivery in Big Active Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
caching policies
TTL caching
TTL based caching
Publish-subscribe
pattern clustering
notifications delivery
notification delivery
eviction-based caching
end users
edge caching
distributed broker nodes
declarative subscriptions
data management paradigm
data items
computer science
caching strategies
Big Data
bigdata publish-subscribe system
big active data systems
Big active data
BAD system
backend data cluster
Web Caching
cache storage
Distributed databases
Electronic mail
Task Analysis
Scalability
Resiliency
Metrics
pubcrawl
biblio
A software-defined networking framework for IoT based on 6LoWPAN
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
Wireless communication
telecommunication power management
Task Analysis
software-defined wireless management
software-defined networking
software defined networking
SD-WSN6Lo
Resiliency
Random access memory
6LoWPAN
Protocols
Power demand
power consumption
personal area networks
networking framework
management complexity
low power wireless network
IoT
Internet of Things
composability
6LoWPAN networks
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards
biblio
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
sentiment analysis
Perturbation methods
Prediction algorithms
program debugging
pubcrawl
real-world text datasets
Recurrent neural networks
resilience
scoring strategies
pattern classification
Task Analysis
text analysis
text classification
text input
text perturbations
White Box Security
word embedding
adversarial samples
misclassification
Metrics
machine learning
learning (artificial intelligence)
IMDB movie reviews
Enron spam emails
DeepWordBug
deep learning classifiers
deep learning
composability
character-level transformations
black-box generation
black-box attack
black box attack
adversarial text sequences
biblio
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
Pathfinding
White-box Q table variation
White-Box attack
White Box Security
Training
Task Analysis
security
robots
robotic automatic pathfinding application
resilience
research hotspot
representative Deep Q Network algorithm
pubcrawl
Prediction algorithms
adversarial examples
optimal path finding
Metrics
machine learning
learning (artificial intelligence)
DQN pathfinding training
DQN algorithm attack
DQN
deep reinforcement learning
countermeasure application scenario
composability
Artificial Intelligence
adversarial samples
adversarial examples construction
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »