Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Malware Classification with Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
learning (artificial intelligence)
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Microsoft malware
Metrics
malware classification
malware binaries
malware
Malimg malware
machine learning approaches
machine learning
Learning systems
challenging malware classification datasets
invasive software
image classification
Human behavior
grayscale images
Gray-scale
feedforward neural nets
deep learning framework
deep learning approach
deep learning
deep convolutional neural networks
convolutional neural networks
convolution
computer architecture
CNN
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
Internet of Things (IoT) Increasing the Necessity to Adopt Specific Type of Access Control Technique
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
IoT
Servers
sensors
security.
security aspect
Resiliency
pubcrawl
privacy aspect
Metrics
IoT Security 2018
Access Control
Internet of Things
Human behavior
data privacy
computer architecture
composability
Cloud Computing
authorisation
access control technique
access control area
biblio
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research
Submitted by aekwall on Wed, 05/01/2019 - 12:41pm
monitoring systems
tools
Servers
security research
security of data
security applications
security
Resiliency
real-time systems
real-time cyber-physical system monitoring tool
real-time CPS monitoring tool
real-time constraints
Real time monitoring
publicly available monitoring tools
pubcrawl
physical phenomena
Human Behavior and Cybersecurity
Monitoring
MiniCPS-based case study
Metrics
Industrial Control Systems
human computer interaction
embedded systems
Cybersecurity
cyber-physical systems
cyber physical systems
CPS-MT
CPS simulations
computerised monitoring
computer architecture
composability
Human behavior
biblio
Designing Secure and Resilient Embedded Avionics Systems
Submitted by aekwall on Wed, 05/01/2019 - 12:41pm
Program processors
unmanned aerial systems
UAS
security principles
security of data
security
safety oriented principles
Safety
resilient embedded avionics systems
Resiliency
real-time systems
pubcrawl
aerospace computing
Metrics
Laboratories
embedded systems
cyber security principles
cyber resources
computer architecture
composability
avionics domains
avionics community
avionics
Aerospace electronics
biblio
Implementation of a Massively Parallel Dynamic Security Assessment Platform for Large-Scale Grids
Submitted by aekwall on Wed, 05/01/2019 - 12:27pm
parallel implementation architecture
Stability analysis
security
Resiliency
pubcrawl
power systems
power system stability
power system security
Power system dynamics
power grids
power engineering computing
plug-in architecture
parallel processing
composability
pan-European operational stability analysis
Metrics
large-scale grids
iTesla project
High performance computing
French grid
electricity grids
Dynamical Systems
Dynamic security assessment
Decision trees
computer architecture
computational platform
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »