Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Text Mining
social networking site Twitter.com
social networking (online)
social media data mining
social media
situational awareness
sentiment analysis
security relevant information retrieval
security of data
Resiliency
resilience
Ransomware
pubcrawl
Metrics
composability
internet
information retrieval
Data mining
data analytics techniques
data analysis
data aggregation
cybersecurity tweet dataset
Cybersecurity
cyberattack
cyber threat landscape
cyber situational awareness information
cyber situational awareness
cyber risk
Cyber Attacks
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
data comparison analysis
wearables security
wearable technology
Manuals
low-cost HETP fitness tracker
location data
HETP watches
Garmin Forerunner 110
garmin
fitness bands
Fitbit Charge HR
fitbit
digital forensic practitioners
Scalability
wearable computers
Wearable devices
Biomedical monitoring
forensic analysis
smart phones
Digital Forensics
Data mining
privacy
pubcrawl
Human behavior
Resiliency
Internet of Things
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Complex Networks Monitoring and Security and Fraud Detection for Enterprises
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
business data processing
complex networks
complex networks monitoring
Compositionality
CoNeSec track
Data mining
data privacy
enterprises
fraud
fraud detection
Human Factors
network log data
pubcrawl
Resiliency
security
Smart Grid Sensors
biblio
Detection of the Information Hidden in Image by Convolutional Neural Networks
Submitted by grigby1 on Mon, 02/10/2020 - 11:45am
hidden information
steganography detection
Steganography
steganalysis
pubcrawl
privacy
object detection
Metrics
information protection
Image Processing
high probability
basic data
hidden communication
Data mining
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
computer architecture
composability
Brightness
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
extracting information
Microelectronics Security
time reduction
space reduction
side channel attack
security circuit implementation
profiled stage
profiled DPA
new information extractor
machine learning method
information retrieval
high order masking scheme
high order masking circuit
high order masking
Cryptography
explained local variance
ELV
CHES 2015
Predictive Metrics
computer science
principal component analysis
microsoft windows
Data mining
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Hardware
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »