Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Reuse
biblio
EARRING: Efficient Authentication of Outsourced Record Matching
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
integrity
VO
verification object
third-party server
specific distance metrics
Servers
security
Resiliency
record matching
pubcrawl
outsourcing paradigm
outsourcing
outsourced record matching framework
outsourced dataset
Outsourced Database Integrity
Cloud Computing
Information Reuse
information integration
identifying matching records
Euclidean distance
Entity Resolution
design EARRING
data privacy
data management
authentication
Big Data
correct record matching results
data integrity
Big Data Analytics
big data security metrics
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Software reuse
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
pubcrawl
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
Android (operating system)
origin analysis
Information Reuse
Firefox source code
file clone detection
efficient file similarity computation
directory names
Debian Linux package
Debian GNU package
Data mining
Cryptography
component extraction
Cloning
clone-and-own reuse analysis
b-bit minwise hashing technique
Android source code
biblio
An Integrated Approach for Resilience in Industrial Control Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Software systems
self-adaptive software system
security
Run Time
Resiliency
resilience
pubcrawl
Monitoring
model-driven engineering techniques
model-driven engineering
meta-adaptive system
Adaptation models
industrial plants
Industrial Control Systems
industrial control system
industrial control
hydropower plant units
hydroelectric power
Hardware
Design Time
controller configurations
contract-based design paradigm
contract-based design
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
biblio
Malware Collection and Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
malware
University of Arizona
security
Resiliency
pubcrawl
National Science Foundation funded project
malware datasets
Malware Collection
Malware Analysis
Androids
invasive software
Information Reuse
Humanoid robots
feature extraction
Data mining
computer security
Big Data
biblio
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
MapReduce
uncertain knowledge representation
styling
Structure Learning
security
search problems
score-and-search-based algorithm
Resiliency
pubcrawl
parallel processing
network theory (graphs)
Mutual information
Massive Data
Markov processes
Algorithm design and analysis
learning (artificial intelligence)
Knowledge representation
Information Reuse
Hybrid Learning
hybrid Bayesian network structure learning
distributed hybrid structure learning algorithm
directed graphs
Data models
data mining model
Data mining
constraint-based algorithm
Bayes methods
Bayesian network
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
software houses
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
Resiliency
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches
ontological modeling approach
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
API
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
« first
‹ previous
1
2
3