Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
scientific computing
biblio
Exploration of the principle of 6G communication technology and its development prospect
Submitted by grigby1 on Thu, 08/24/2023 - 2:51pm
surgery
performance index
Challenges and development
application scenarios
6G communication
Human Factors
Cyber Physical System
6G mobile communication
cyber physical systems
scientific computing
immersive systems
pubcrawl
Transportation
military communication
composability
Medical services
5G mobile communication
privacy
Resiliency
resilience
Human behavior
biblio
Research on the technical application of artificial intelligence in network intrusion detection system
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
information security
security
Neural networks
pubcrawl
network security
privacy
Artificial Intelligence
composability
Compositionality
surveillance
information processing
computational intelligence
scientific computing
network intrusion detection
biblio
The Computational and Symbolic Security Analysis Connections
Submitted by grigby1 on Fri, 02/17/2023 - 5:21pm
pubcrawl
Metrics
resilience
Resiliency
Protocols
Computational modeling
automata
Compositionality
Numerical models
scientific computing
Data integration
cloud storage
computational security
Light rail systems
Symbolic Security Analysis
Scientific Computing Security
biblio
Secret Numerical Interval Decision Protocol for Protecting Private Information and Its Application
Submitted by grigby1 on Fri, 02/17/2023 - 5:20pm
privacy protection
Scientific Computing Security
secret comparison
numerical range
Morton code
Asia
Homomorphic encryption
scientific computing
Compositionality
information security
Decision Making
Protocols
privacy
Resiliency
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
A Zero Trust Model Based Framework For Data Quality Assessment
Submitted by grigby1 on Fri, 12/02/2022 - 11:09am
Human behavior
zero trust
Trusted Data
scientific computing
Resiliency
resilience
pubcrawl
Organizations
Industries
Human Factors
Acoustic Fingerprints
Data quality dimensions
data quality assessment
data quality
Data models
data integrity
Costs
Computational modeling
composability
biblio
On the Impact of the Embedding Process on Network Resilience Quantification
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
critical infrastructure
pubcrawl
Metrics
Topology
network topology
Extraterrestrial measurements
reliability theory
data analysis
scientific computing
Security Metrics
Computing Theory
graph embedding
Computational Topology
network resilience
Wasserstein Distance
WEGL
biblio
Privacy Modelling in Contact Tracing
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
security
pubcrawl
Human behavior
Scalability
privacy
Protocols
Computational modeling
scientific computing
expert systems
data privacy
Human Factors
COVID-19
Pandemics
Electric potential
Consumer electronics
Deceases
biblio
Generative Adversarial Network Applications in Creating a Meta-Universe
Submitted by grigby1 on Wed, 08/10/2022 - 2:47pm
machine learning
pubcrawl
Artificial Intelligence
composability
Compositionality
Three-dimensional displays
generative adversarial networks
generative adversarial network
computational intelligence
scientific computing
Imaging
faces
CycleGAN
GAN Applications
Style-GAN
biblio
An Image Watermarking based on Multi-level Authentication for Quick Response Code
Submitted by aekwall on Thu, 07/14/2022 - 4:15pm
codes
QR codes
watermark recovery
tempered image
QR code image
multi-level authentication
digital watermarking
location awareness
scientific computing
Watermarking
cyber-physical systems
Hash functions
Resiliency
pubcrawl
authentication
Software
security
Cryptography
biblio
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods
Submitted by grigby1 on Tue, 07/12/2022 - 3:10pm
feature extraction
machine learning algorithms
pubcrawl
Human behavior
Resiliency
malware
Metrics
Browsers
Syntactics
resilience
scientific computing
cryptojacking
Lead
1
2
3
next ›
last »