Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Research on Intelligent Evaluation Method of Transient Analysis Software Function Test
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Software Vulnerability
security of data
Software
software function failure
software functional completeness
software functional integrity positioning
software metrics
software reliability
software reliability measurement
reliability intelligent evaluation
spectral density distribution method
statistical distributions
testing
Transient analysis
transient analysis software function testing
transient distributed
transient distributed cloud computing environment
intelligent evaluation method
active deep learning mathematical model
active depth learning algorithm
association rule mining method
Cloud Computing
cloud computing environment
correlation dimension characteristics
Data mining
Functional testing
active deep learning
learning (artificial intelligence)
Measurement
metrics testing
Metrics
program diagnostics
program testing
pubcrawl
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
auditing
Human Behavior and Cybersecurity
triangle of fraud
senior managers
semantic techniques
payroll employees
FraudFind
fraud triangle theory
financial fraud detection
financial audit model
Continuous Audit
bank fraud
Human Factors
human factor
security of data
Banking
financial data processing
behavioural sciences computing
fraud
Personnel
Data mining
Cybersecurity
tools
pubcrawl
Human behavior
Electronic mail
real-time systems
Organizations
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
Framework for Data Driven Health Monitoring of Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
real-time systems
feature extraction method
health monitoring
heterogeneous data streams
interconnected computational resources
Monitoring
Neurons
physical resources
power engineering computing
pubcrawl
feature extraction
resilience
Resiliency
Self-organizing feature maps
state estimation
state identification
time state estimation
Unsupervised Learning
visualization technique
data acquisition
building management systems
condition monitoring
continuous monitoring
CPS operational health
CPS resilience
CPS testbed
cyber physical systems
cyber-network
cyber-physical systems
Anomaly Detection
data driven health monitoring
data driven methodology
data driven techniques
data features
Data mining
Degradation
distributed power generation
explainable AI
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
cyber-physical systems security
CPS resilience
wastewater treatment plant
wastewater treatment
System Dynamics
situational awareness and security metrics
single system-wide measure
Resilience Metrics
resilience indexes
remote monitoring
general-purpose evaluation methodology
digital computers
cyber-physical system resilience
critical feedback control loop
bulky system logs
CPSS
security of data
Critical Infrastructure Protection
resilience
Indexes
cyber physical systems
Cyber Attacks
Data mining
Mathematical model
risk management
internet
pubcrawl
Resiliency
critical infrastructures
cyber security
security
Monitoring
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »