Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Measurement
biblio
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
Submitted by grigby1 on Mon, 09/18/2023 - 4:35pm
deep learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
privacy
process control
flow graphs
malware
Measurement
Task Analysis
graph theory
Malware Analysis
graph neural networks
Resiliency Coordinator
biblio
A Survey of Explainable Graph Neural Networks for Cyber Malware Analysis
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
Cybersecurity
Resiliency Coordinator
Explainability
classification
Malware Analysis
graph neural networks
graph theory
Measurement
malware
Big Data
machine learning
telecommunication traffic
Computational modeling
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
PbV mSp: A priority-based VM selection policy for VM consolidation in green cloud computing
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
composability
VM consolidation
Service-level Agreement (SLA)
priority-based VM selection
PBVmSP
green cloud computing
Green products
Internet-scale Computing Security
Pricing
energy consumption
Compositionality
Measurement
signal processing
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
information security
Cloud Computing
biblio
Research on Intellectual Property Protection of Artificial Intelligence Creation in China Based on SVM Kernel Methods
Submitted by grigby1 on Thu, 09/07/2023 - 3:59pm
Resiliency
orthogonal design
KSVM
Analysis of variance
Data preprocessing
Measurement
Law
composability
intellectual property
information security
resilience
policy-based governance
pubcrawl
Artificial Intelligence
Support vector machines
security
machine learning
biblio
Information Theory Based Evaluation Method For Wireless IDS: Status, Open Problem And Future Trends
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Human Factors
Solids
information theory
information theoretic security
Market research
uncertainty
Compositionality
Measurement
network security
composability
collaboration
Entropy
wireless sensor networks
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Employing Information Theoretic Metrics with Data-Driven Occupancy Detection Approaches: A Comparative Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 2:22pm
Entropy
Occupancy Detection
Information Gain
Gini Impurity Index
cross-entropy
Human Factors
Temperature distribution
information theoretic security
Signal processing algorithms
Compositionality
Measurement
composability
signal processing
Scalability
Radio frequency
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
information security
collaboration
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 3:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods
Submitted by grigby1 on Fri, 08/25/2023 - 3:41pm
Metrics
behavioral model
Resiliency
supervised learning
OCSVM
Data integration
Measurement
Policy Based Governance
Computational modeling
resilience
policy-based governance
deep learning
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
Anomaly Detection
Support vector machines
Organizations
machine learning
insider threat
biblio
Method for Determining the Optimal Number of Clusters for ICS Information Processes Analysis During Cyberattacks Based on Hierarchical Clustering
Submitted by grigby1 on Fri, 08/18/2023 - 4:13pm
cyberattack
cyberattack classification
hierarchical clustering
Production management
Resiliency
ICS Anomaly Detection
Labeling
Measurement
Computer crime
Training
integrated circuits
industrial control system
industrial control
Scalability
resilience
pubcrawl
Anomaly Detection
1
2
3
4
5
6
7
8
9
…
next ›
last »