Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personalized recommendation
user interest mining
tagging
social tagging users
social tagging recommendation
social networking (online)
Social Agents
Servers
self-adaptive recommendation strategy
self-adaptive recommendation
Scalability
resource management
recommender systems
pubcrawl
personalized recommendation strategy
Adaptation models
multi-agent systems
intelligent social tagging recommendation system
information retrieval
Human Factors
Human behavior
Filtering
equilibrium selection
Data models
Data mining
computer architecture
common preference group recommendation strategy
common preference group recommendation
Agent technology
biblio
Next Generation Automotive Architecture Modeling and Exploration for Autonomous Driving
Submitted by el_wehby on Fri, 05/25/2018 - 4:23pm
next generation automotive architecture modeling
timing
system integration
Software Architecture
Software
sensors
security
road vehicles
optimization
optimisation
Automotive engineering
mobile robots
mechanical engineering computing
heterogeneous components
hardware architecture
design metrics validation
control engineering computing
computer architecture
Autonomous Driving
Autonomous automobiles
1553757
biblio
Automotive Cyber #x2013;Physical Systems: A Tutorial Introduction
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
Algorithm design and analysis
Automotive engineering
computer architecture
Control Theory
Program processors
Software algorithms
Tutorials
1553757
biblio
Automated Vulnerability Analysis Technique for Smart Grid Infrastructure
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
smart grid infrastructure
Power system protection
pubcrawl
resilience
Resiliency
security
security of data
security vulnerability analysis
Smart Grid
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
static analysis
Vulnerability Analysis
vulnerability analysis methodologies
vulnerability discovery method
automated power electricity network
power grid system
power engineering computing
power electricity infrastructure
Metrics
Korean smart grid environment
general systems
embedded software vulnerability discovery
embedded software
cyber-physical system security
cyber-physical system
Computer bugs
computer architecture
Compositionality
composability
automated vulnerability analysis
biblio
DAS: An Efficient NoC Router for Mixed-Criticality Real-Time Systems
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
NoC router
worst-case communication latency
wormhole and store and forward technique
Wormhole
virtual channel
Switches
Store And Forward
Software
security
Router Systems Security
Router Systems
Resiliency
resilience
real-time systems
pubcrawl
Ports (Computers)
computer architecture
network-on-chip
network use rate
network routing
multiprocessing systems
multiple virtual channels
mixed-criticality systems
Metrics
MCS
low-critical flow
high-critical flows
double arbiter and switching router
delays
DAS
cycle-accurate SystemC NoC simulator
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
pubcrawl
telecommunication traffic
Software Defined Networks
software defined networking
sFlow-RT
sFlow
security of data
security
SDN security
SDN
Scalability
Resiliency
computer architecture
Protocols
performance aware Software Defined Networking
OpenFlow
Monitoring
Hardware
DoS attack
Denial of Service attacks
denial of service attack
data centers
control systems
computer network security
biblio
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
function level features
vulnerability function
Training
third-party code bases
SVM
suspicious functions
Support vector machines
support vector machine
Software
security of data
Resiliency
resilience
real-world firmware images
pubcrawl
Microprogramming
Metrics
ACFG
flow graphs
firmware security
firmware
feature extraction
CVSSA
cross-architecture vulnerability search methods
cross-architecture
computer architecture
Computational modeling
composability
bipartite matching
binary firmware
basic-block level features
attributed control flow graph
biblio
A comparison of CNN-based face and head detectors for real-time video surveillance applications
Submitted by K_Hooper on Wed, 04/04/2018 - 9:55am
computer architecture
Convolutional NNs
Detectors
Face
Face detection
feature extraction
Head Detection
Human behavior
Proposals
pubcrawl
Resiliency
Scalability
video surveillance
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »