Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Terminology
biblio
Applying Chemical Linguistics and Stylometry for Deriving an Author’s Scientific Profile
Submitted by grigby1 on Fri, 09/09/2022 - 1:27pm
tools
pubcrawl
Human behavior
Metrics
Vocabulary
stylometry
Linguistics
NLP
frequency-domain analysis
Writing
Terminology
author profile
chemical linguistics
Google Scholar
Tokenization
Web search
biblio
Towards an Immersive Learning Knowledge Tree - a Conceptual Framework for Mapping Knowledge and Tools in the Field
Submitted by grigby1 on Mon, 05/23/2022 - 2:57pm
immersive learning
research
Knowledge Tree
Epistemology
Soil
Terminology
knowledge based systems
immersive systems
Ontology
tools
Birds
Proposals
composability
privacy
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
A Simple Data Augmentation Method to Improve the Performance of Named Entity Recognition Models in Medical Domain
Submitted by aekwall on Wed, 04/13/2022 - 9:21am
computer science
deep learning
pubcrawl
Scalability
privacy
Terminology
Adaptation models
annotations
text categorization
BERT
BioBERT
data augmentation
medical data
NER
Text recognition
data deletion
biblio
Ensemble Learning Based Network Anomaly Detection Using Clustered Generalization of the Features
Submitted by grigby1 on Tue, 10/12/2021 - 1:48pm
AdaBoost
Classification algorithms
Clustering algorithms
Ensemble Learning
Fitting
Generalization
hybridization
Metrics
Overfit
Prediction algorithms
Predictive models
predictive security metrics
pubcrawl
Stacking
Terminology
biblio
Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space
Submitted by aekwall on Tue, 08/17/2021 - 3:05pm
policy-based governance
ipv6 security
Velocity measurement
Terminology
network measurement
Hitlist
Buildings
Address Probing
IPv6
security
Probes
composability
Resiliency
Metrics
pubcrawl
quality of service
internet
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
Databases
preparation and pre-response category
Planning
investigation process model
harmonized DBFI process
design science research methodology
database forensics
database forensic investigation processes
Database forensic investigation
analysis and reconstruction category
acquisition and preservation category
Terminology
information forensics
Adaptation models
digital data
Data models
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
Servers
database management systems
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 10:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
honeypots
underground market
UBA
Terminology
SIEM
security of data
security experts
security
sandboxing
pubcrawl
policy-based governance
Policy
Monitoring
Market research
life cycle phases
advanced persistent threat
highly skilled actors
Government
Governance
Electronic mail
delays
defence strategy
cyber-attacks
composability
compiled life cycle model
Biological system modeling
APT protection technologies
APT
advanced persistent threat attacks life cycle
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences