Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sorting
biblio
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools
Submitted by grigby1 on Fri, 12/23/2022 - 11:54am
Windows Operating System Security
Shellbag
Freeware
forensics tools
digital forensics investigations
Behavioral sciences
artifacts
Open Source Software
Sorting
security
Digital Forensics
operating system
operating systems
Windows Registry
composability
Resiliency
Metrics
pubcrawl
biblio
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases
Submitted by grigby1 on Fri, 07/29/2022 - 4:47pm
encryption
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Databases
estimation
Metrics
Sorting
Non-deterministic OPE
Order Preserving Encryption
Range Query over Encrypted Databases
outsourced database security
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
network flow
transport protocols
nondominated sorting genetic algorithm II
network monitoring probes
multiobjective evolutionary design method
linear genetic programming
IPv6 network flow hashing
IPv6 flow hashing
Internet Protocol
high-speed network systems
high-quality network flow hashing
genetic programming
Cartesian genetic programming
Monitoring
hash algorithms
Hash Function
evolutionary computation
Compositionality
Throughput
computer network
pubcrawl
Sorting
genetic algorithms
Resiliency
Task Analysis
IP networks
biblio
An Improved Multi-objective Particle Swarm Optimization
Submitted by aekwall on Mon, 12/14/2020 - 12:40pm
evolutionary computation
ZDT\textbackslashtextbackslashDTLZ test functions
track planning problems
Pareto optimisation
NSGA-II
nondominated sorting genetic algorithm II
multiobjective particle swarm optimization
multiobjective evolutionary algorithm based on decomposition
multi-objective particle swarm optimization
multi-objective optimization algorithm
MOPSO
MOEA/D
Approximation algorithms
pubcrawl
Compositionality
Sorting
genetic algorithms
Statistics
Sociology
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
biblio
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Heating systems
Human Behavior and Cybersecurity
topological sort networks
network theory
movement association
mixed methods
graph topological ordering
dynamic decision-making
adversarial team
adversarial movement complexity
adaptive human behavior
Human behavior
security of data
cyberattacks
integrated circuits
Sorting
network theory (graphs)
social network
Training
Decision Making
tools
graph theory
pubcrawl
Computer crime
biblio
Willing to be fooled: Security and autoamputation in augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:31pm
pubcrawl
Trusted Computing
Stress
Sorting
sensors
security of data
security
Scalability
risk reduction
resilience
Accuracy
privacy
Media
Human behavior
computer security
autoamputation concept
augmented reality systems
augmented reality
anonymity protection
biblio
What Do Developers Discuss about Biometric APIs?
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
Market research
application programming interface
system developers
sound biometric system
Neurotechnology
multiple implementation environments
Empirical Software Engineering
biometrics
biometric-based algorithms
biometric technology
biometric API-related posts
APIs misuse
Face
pubcrawl
Sorting
documentation
feature extraction
Compositionality
Task Analysis
biometrics (access control)
application program interfaces
APIs
Software
Resiliency
resilience
biblio
Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
locality-sensitive hashing algorithm
tree searching
tree search method
space complexity
Sorting
Resiliency
query processing
pubcrawl
Pattern recognition
NNS
nearest neighbour methods
nearest neighbor search
nearest neighbor query
machine learning
C2LSH
locality sensitive hashing
Image detection
Heapsort
heap sort of hash bucket algorithm
hash table
Hash functions
hash algorithms
file organisation
data sorting
Cryptography
computational complexity
Compositionality
biblio
Parallel Implementation of K-Nearest-Neighbors for Face Recognition
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
graphics processing units
Time complexity
parallel CUDA implementation
parallel architectures
KNN classifier
k-nearest-neighbours classifier
Instruction sets
countless classification algorithms
nearest neighbor search
Sorting
pubcrawl
image classification
face recognition
nearest neighbour methods
Measurement
Metrics
Classification algorithms
pattern classification
Indexes
biblio
Collaborative Model-Based Fallback Control for Secured Networked Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
multiple countermeasures
Switches
Sports equipment
Sorting
sensors
security of data
security
secured networked control systems
scalable
Scalability
Resiliency
resilience
pubcrawl
Petri Net
networked control systems
Networked Control Systems Security
Industrial Control Systems
industrial control system security
industrial control
field network signal
cyber-attacks
countermeasure
control engineering computing
collaborative model-based fallback control
collaborative FCS
Collaborative Fallback Control System
collaboration function
collaboration
analog signal
1
2
next ›
last »