Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Automated Implementation of Windows-related Security-Configuration Guides
Submitted by grigby1 on Thu, 06/24/2021 - 11:26am
pubcrawl
Operating systems security
Resiliency
resilience
composability
Metrics
Automated Secure Software Engineering
Configuration Management
Data mining
Manuals
natural language processing
operating systems
Organizations
security
Task Analysis
biblio
AtNE-Trust: Attributed Trust Network Embedding for Trust Prediction in Online Social Networks
Submitted by aekwall on Tue, 06/01/2021 - 1:27pm
Employment
trust prediction
social networking (online)
Resiliency
pubcrawl
Predictive models
online social networks
Human Factors
Fuses
Computing Theory
Decision Making
Data models
Data mining
Computing Theory and Trust
composability
Attributed network embedding
trust
biblio
Early Detection of Vulnerabilities from News Websites using Machine Learning Models
Submitted by aekwall on Tue, 05/18/2021 - 3:19pm
computer security
BERT language model
OSINT
natural language processing
Compositionality
cybernetics
vulnerability detection
Bit error rate
Data mining
Task Analysis
Metrics
pubcrawl
Human behavior
Resiliency
early detection
Support vector machines
Data models
biblio
Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology
Submitted by grigby1 on Thu, 05/13/2021 - 11:57am
Data mining
Security Detection Technology
network attack and defense
information security risk
Computer crashes
artificial intelligence technology
artificial intelligence security
Task Analysis
Artificial Intelligence
risk management
composability
Communication networks
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring
Submitted by grigby1 on Wed, 05/05/2021 - 12:31pm
SCADA
SCADA Systems Security
undesired events
process-related threats
malicious actions
Itemsets
logs
SCADA System Security
power systems
Substations
Monitoring
Compositionality
Data mining
SCADA systems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
biblio
Scalable, Reliable and Robust Data Mining Infrastructures
Submitted by grigby1 on Wed, 05/05/2021 - 12:23pm
Data mining
Data visualization
Infrastructure
machine learning
Open Source Software
pubcrawl
robust
Robustness
Scalability
scalable
Scalable Security
Task Analysis
Techniques
tools
biblio
Data Mining Visualization with the Impact of Nature Inspired Algorithms in Big Data
Submitted by grigby1 on Tue, 04/27/2021 - 2:47pm
Big Data
big data security in the cloud
cloud
Cloud Computing
Cloud computing and Computation capability
Computational modeling
Data mining
Data visualization
Market research
pubcrawl
security
biblio
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information
Submitted by aekwall on Tue, 04/27/2021 - 1:36pm
Scalability
security
Software
Resiliency
pubcrawl
privacy
tools
Data mining
Computer bugs
program analysis
fuzzing
Security Heuristics
predictability
Automated Testing
biblio
Construction of Audit Internal Control System Based on Online Big Data Mining and Decentralized Model
Submitted by aekwall on Tue, 04/27/2021 - 1:29pm
Scalability
Big Data
security
Task Analysis
Data models
Resiliency
Human behavior
pubcrawl
Data mining
control systems
Information systems
Security Audits
data stream
decentralized model
Internal Control
biblio
Improvement of information System Audit to Deal With Network Information Security
Submitted by aekwall on Tue, 04/27/2021 - 1:27pm
Inspection
Scalability
Resiliency
Human behavior
pubcrawl
Penetration Testing
Business
Data mining
Information systems
Uniform resource locators
Security Audits
Zirconium
Information System Audit
network information security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »