Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
SLA-Based Secure Cloud Application Development: The SPECS Framework
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
user-defined security feature
Unified modeling language
supply chains
SPECS framework
SPECS
SLA-based secure cloud application development
security-enhanced service
security-as-a-service
security SLA
security service level agreement
API
security
secure Web server
Secure Cloud Application Development
pubcrawl170112
Monitoring
contracts
Context
Cloud Computing
application program interfaces
biblio
Cloud supply chain resilience
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
information and communication technologies
supply chains
supply chain theory
supply chain resilience concept
supply chain management
resilience
pubcrawl170112
outsourcing benefits
organisational resilience (OR)
organisational resilience
Cloud Computing
ICT services supply chain
ICT operational resilience
coordination mechanisms
Context
Computational modeling
cloud supply chain resilience
cloud supply chain (CSC) resilience
cloud computing environments (CCE)
biblio
DIBR synthesized image quality assessment based on morphological pyramids
Submitted by grigby1 on Wed, 03/08/2017 - 2:06pm
morphological filter
visual perception
Three-dimensional displays
state-of-the-art image quality measure
rendering (computer graphics)
pubcrawl170111
nonuniform geometric distortion
multiscale measure
Multi-scale PSNR
MP-PSNR
morphological pyramids
morphological pyramid peak signal-to-noise ratio
morphological pyramid decomposition scheme
morphological pyramid
Band-pass filters
mathematical morphology
Image quality
image filtering
human visual perception
human judgment
edge detection
edge coherency
Distortion measurement
distortion
DIBR synthesized image quality assessment
depth image based rendering technique
Context
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Enhanced Evaluation of the Interdomain Routing System for Balanced Routing Scalability and New Internet Architecture Deployments"
Submitted by grigby1 on Tue, 02/21/2017 - 12:02pm
internet
telecommunication network routing
service-oriented architecture
Scalability
routing scalability
routing evaluation
Routing
quantitative metrics
pubcrawl170103
Measurement
ISP
Internet service provider
Internet architecture deployment
Balanced incentives
interdomain routing system evaluation
interdomain routing
future Internet architectures (FIA)
future Internet architecture
FIA
dirty-slate architecture
Context
computer network performance evaluation
computer architecture
clean-slate architecture
balanced routing scalability
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 1:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk
file
Khalaj_Impact_Analysis.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »