Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
visualization
biblio
A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Compositionality
Information Reuse and Security
SUMMON
simulation experiments
simulation environments
open IoT data archiving
IoT-cloud systems
IoT trace archiving service
information retrieval systems
data retrieval
data management services
automated Web crawling service
Cloud Computing
smart cities
visualization
sensor data
Crawlers
web services
Databases
Computational modeling
pubcrawl
Resiliency
Data models
Internet of Things
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 1:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
biblio
Adversarial Examples Against Image-based Malware Classification Systems
Submitted by grigby1 on Thu, 10/29/2020 - 10:13am
learning (artificial intelligence)
visualization
Robustness
Resiliency
resilience
pubcrawl
privacy
Perturbation methods
Metrics
malware files
malware classification
malware
mal-ware classification techniques
machine learning
adversarial attack
invasive software
image-based malware classification systems
image classification
Human behavior
DL-based classification systems
data visualisation
convolutional neural networks
convolutional neural network malware classifiers
convolutional neural nets
convolution neural network
computer vision
adversarial attacks
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
biblio
Person Identification from Visual Aesthetics Using Gene Expression Programming
Submitted by aekwall on Mon, 10/12/2020 - 10:46am
person identification
behavioral biometric
discriminatory features
feature recombination
Flickr users
Gene expression
gene expression programming
Genetics
online human interactions
aesthetics
personal activities
physical traits
professional activities
tree-based genetic approach
users aesthetic preferences
visual aesthetic
Human Behavior and Cybersecurity
programming
aesthetic feature dimensionality reduction
Behavioral biometrics
Head
Pattern recognition
visualization
biometrics (access control)
principal component analysis
human computer interaction
trees (mathematics)
Cybersecurity
pattern classification
social networking (online)
pubcrawl
Human behavior
feature extraction
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
Neural Algebra of Classifiers
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
image recognition
visualization
visual recognition benchmarks
Training
simple visual classifiers
pubcrawl
Neural networks
neural network modules
neural nets
neural algebra
algebra
image classification
Compositionality
complex visual concept
classifier
boolean algebra operations
Boolean algebra
Birds
Beak
biblio
Learning Compositional Sparse Bimodal Models
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
human-robot interaction
visualization
tabletop robotics
tabletop building-blocks setting
symbol grounding
Semantics
Robot sensing systems
red squares
pubcrawl
Poles and towers
Multimodal learning
learning compositional sparse bimodal models
learning (artificial intelligence)
image representation
image colour analysis
Artificial Intelligence
human evaluation studies
encoding
Dictionaries
Compositionality
compositional structure
compositional semantics
compositional learning
compositional elements
compositional basis
colored shapes
blue triangles
bimodal sparse representation
bimodal perceptual domain modeling
bimodal dataset
biblio
Recognition of Visually Perceived Compositional Human Actions by Multiple Spatio-Temporal Scales Recurrent Neural Networks
Submitted by grigby1 on Mon, 10/05/2020 - 1:01pm
RGB input data
MSTRNN model aid
multiple spatio-temporal scales recurrent neural network model
multiple timescale recurrent dynamics
neural activities
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
learning (artificial intelligence)
spatio-temporal constraints
spatio-temporal information extraction
Spatiotemporal phenomena
symbol grounding
Training
visualization
visually perceived compositional human action recognition
different compositionality levels
Biological neural networks
Compositionality
conventional convolutional neural network model
convolution
Convolutional codes
convolutional neural network (CNN)
critical spatio-temporal information
deep learning model
action recognition
dynamic vision processing
feature extraction
feedforward neural nets
gesture recognition
human action datasets
image motion analysis
image representation
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 10:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »