Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern matching
biblio
The Identification of Supplier Selection Criteria Within a Risk Management Framework Towards Consistent Supplier Selection
Submitted by aekwall on Mon, 02/25/2019 - 10:43am
pattern matching
Supply Chain Risk Assesment
triangulation model
train manufacturer
supplier selection criteria
supplier risk assessment.
structured supplier risk assessment
Stability criteria
South Africa
source information
risk management framework
pubcrawl
organisational aspects
Interviews
document analysis
Bibliographies
supply chains
supply chain management
risk management
standards
Metrics
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Metrics
Sniffles
situational awareness
security systems
Resiliency
Regular expressions
regular expression processing capability
Regexbench
pubcrawl
performance evaluation
PCRE
pattern matching
composability
Handheld computers
deep packet inspection
decision maker mission completeness
Cybersecurity
cyber threats
cyber situational awareness enhancement
cyber situational awareness
Cyber Operations
computer security
computer network security
biblio
Privacy-preserving pattern matching over encrypted genetic data in cloud computing
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
genomics
testing
secure DNA sequence matching problem
Resiliency
regular clinical laboratory tests
pubcrawl
privacy-preserving pattern matching
privacy guarantee
privacy
personalized medicine
personal genomics services
pattern matching
Metrics
Human behavior
health care model
health care
biology computing
genome matching problem
Genetics
encryption
encrypted genetic data
DNA information
DNA data privacy
DNA data
DNA cryptography
DNA
diseases
data privacy
Cryptography
Computational modeling
Cloud Computing
biblio
Linear regression based multi-state logic decomposition approach for efficient hardware implementation
Submitted by grigby1 on Thu, 12/28/2017 - 12:17pm
pattern matching
multi-valued logic
multistate logic decomposition approach
multivalued logic
multivalued logic circuits
multivalued minterms
MVL decomposition
nanoelectronics
Nanoscale devices
more-than-Moore scaling
polynomials
pubcrawl
quaternary sum circuit
regression analysis
technology mapping
visual pattern matching
word length 4 bit
decision diagrams
binary CMOS
binary switches
CMOS adder
CMOS logic circuits
complex polynomials
Compositionality
data conversion
data science
adders
decomposition
domain selection
efficient hardware implementation
interconnection requirements
linear regression
logic design
Metrics
biblio
CAPTCHA Recognition Algorithm Based on the Relative Shape Context and Point Pattern Matching
Submitted by grigby1 on Wed, 12/20/2017 - 12:04pm
image recognition
human beings
twisted adhesion verification code
target contour point set deformation invariance
shape feature description
shape context invariance
shape context descriptors
shape context
Shape
response time
relative shape context
recognition rate
point pattern matching
pattern matching
pubcrawl
image matching
distance uneven grouping
CSDN site verification code
CAPTCHA recognition algorithm
CAPTCHA recognition
character recognition
captchas
CAPTCHA
Context
authorisation
composability
Human Factors
Human behavior
biblio
A Framework for Threat Detection in Communication Systems
Submitted by grigby1 on Tue, 09/05/2017 - 12:19pm
advanced persistent threat
advanced persistent threats
Big Data
Chained Attacks
collaboration
composability
Human behavior
kill chain model
machine learning
Metrics
pattern matching
pubcrawl
Resiliency
Scalability
threat detection
biblio
Node Configuration for the Aho-Corasick Algorithm in Intrusion Detection Systems
Submitted by grigby1 on Tue, 05/16/2017 - 11:26am
Aho-Corasick algorithm
composability
Computing Theory
deep packet inspection
Deep Packet Inspection (DPI)
Intrusion Detection System (IDS)
Metrics
node configuration
pattern matching
pubcrawl
Scalability
Security Metrics
string matching
« first
‹ previous
1
2
3
4
next ›
last »