Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat vectors
biblio
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
threat vectors
Human behavior
LSTM networks
Metrics
policy-based-governance
privacy
pubcrawl
Resiliency
SQL injection
SQL injection detection
SQL token word vector
biblio
Assessment of Vulnerability Severity Using Text Mining
Submitted by grigby1 on Wed, 04/11/2018 - 1:50pm
classification
information security
Metrics
privacy
pubcrawl
software security
Software Vulnerability
Text Mining
threat vectors
biblio
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Submitted by grigby1 on Wed, 04/11/2018 - 1:50pm
Intel SGX
Metrics
privacy
pubcrawl
side channel attacks
threat vectors
biblio
Cache-Based Application Detection in the Cloud Using Machine Learning
Submitted by grigby1 on Wed, 04/11/2018 - 1:50pm
cross-vm attacks
machine learning
Metrics
prime&probe
privacy
pubcrawl
SVM
threat vectors
biblio
Image Feature Extraction with Homomorphic Encryption on Integer Vector
Submitted by grigby1 on Wed, 04/11/2018 - 1:50pm
feature extraction
Histogram Descriptor
Homomorphic encryption
Metrics
privacy
privacy protection
pubcrawl
threat vectors
biblio
A Method of Cyber Security Vulnerability Test for the DPPS and PMAS Test-Bed
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
operating nuclear plant control system
vulnerability scanning tool
Vulnerability
tools
threat vectors
test-bed
security of data
pubcrawl
privacy
PMAS test-bed
Plant Monitoring Annunciator System (PMAS)
Application software
Monitoring
Metrics
maintenance engineering
DPPS test-bed
Digital Plant Protection System (DPPS)
cyber security vulnerability test
cyber security evaluation process
cyber security
control systems
computer security
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Support Vector Machine for Network Intrusion and Cyber-Attack Detection
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
network intrusion
Training
threat vectors
telecommunication traffic
Support vector machines
support vector machine
statistical techniques
statistical analysis
security of data
pubcrawl
privacy
Ports (Computers)
anomaly-based IDS
ML techniques
Metrics
Measurement
machine learning
Local area networks
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
cyber-security threats
cyber-attack detection
biblio
Hunting for Naval Mines with Deep Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
sonar imaging
modest DNN model
naval engineering computing
neural nets
privacy
pubcrawl
remotely operated vehicles
robot vision
sea faring vessels
side-scan sonar imagery
Sonar
minelike objects
support vector machine
Support vector machines
threat vectors
Throughput
trainable parameter count
Training
Training data
Underwater vehicles
visualization technique
Weapons
DNN depth
autonomous unmanned underwater vehicle
Brain modeling
calculation requirements
computation requirements
Computational modeling
data distribution training
Data models
deep neural network methods
deep neural networks
detection efficacy
autonomous underwater vehicles
DNN models
explosive naval mines
explosives
feature extraction
image recognition
image recognition tasks
learning (artificial intelligence)
memory requirements
Metrics
biblio
Demonstrating State-Based Security Protection Mechanisms in Software Defined Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
privacy
virtualisation
threat vectors
telecommunication control
Switches
switch identification
stateful data-plane designs
software radio
software defined networking
security of data
SDN-specific attacks
SDN-NFV
SDN security protection mechanisms
SDN configuration security protection mechanism
pubcrawl
adaptive network security services
Ports (Computers)
network function virtualization technologies
necessary control functions
Metrics
link reconfiguration
Customer Relationship Management
controller interaction
computer network security
computer network management
Communication networks
automated network security services
authentication
application program interfaces
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »