Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Security Classification of Mobile Intelligent Terminal Based on Multi-source Data Fusion
Submitted by grigby1 on Fri, 09/08/2023 - 10:07am
security
pubcrawl
resilience
Resiliency
Scalability
composability
computer security
Compositionality
Data integration
intelligent data
evidence theory
D-S evidence theory
mobile intelligent terminal
Multi-source data fusion
Safety classification
Weight calculation
biblio
Access Control Audit and Traceability Forensics Technology Based on Blockchain
Submitted by grigby1 on Fri, 09/01/2023 - 3:20pm
metadata
security audit
Human Factors
blockchains
information forensics
Secure storage
Forensics
Access Control
maintenance engineering
computer security
blockchain
Big Data
authorization
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 3:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
Submitted by grigby1 on Thu, 08/24/2023 - 2:49pm
Artificial Intelligence
Human Factors
Cyber Physical System
Learning systems
federated learning
cyber physical systems
education
Context modeling
immersive systems
virtual reality
best practices
Training
computer security
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
machine learning
Cyber-security
biblio
Generative Adversarial Networks for Remote Sensing
Submitted by grigby1 on Thu, 08/03/2023 - 2:12pm
deep learning
risk management
pubcrawl
Metrics
resilience
Resiliency
Scalability
Big Data
computer security
Semantics
generative adversarial networks
remote sensing
Generative Adversarial Learning
semantic segmentation
cloud removal
conditioanl generative adversarial networks
biblio
Access Distribution to the Evaluation System Based on Fuzzy Logic
Submitted by grigby1 on Fri, 07/28/2023 - 3:33pm
information technology
mamdani fuzzy inference
fuzzy system
MATLAB
information protection
Fuzzy logic
computer security
real-time systems
information system
security
Computational modeling
Hardware
Software
Resiliency
resilience
Metrics
pubcrawl
biblio
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
Submitted by grigby1 on Tue, 07/11/2023 - 2:17pm
security
pubcrawl
Metrics
resilience
Resiliency
performance evaluation
composability
Libraries
computer security
Dynamic scheduling
Task Analysis
embedded systems
Dynamical Systems
Symbols
firmware analysis
Vulnerability Research
biblio
Survey on Defense Technology of Web Application Based on Interpretive Dynamic Programming Languages
Submitted by grigby1 on Tue, 07/11/2023 - 2:16pm
Information age
Web application
uncertainty
system defense
Resiliency
resilience
pubcrawl
Metrics
interpretive dynamic programming languages
internet
dynamic networks
Endogenous security
Dynamical Systems
dynamic programming
Cyberspace
cyber security
computer security
composability
security
biblio
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
security
pubcrawl
Scalability
quantum computing
computer security
Games
Information Flow
Compositionality
resilience
Quantum entanglement
channel capacity
covert channels
Resiliency
quantum information
biblio
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender’s Deception Architecture
Submitted by grigby1 on Fri, 04/28/2023 - 4:01pm
computer security
advanced persistent threats (apt)
Cyber-security
policy governance
Minimization
Resiliency
computer theory
game theory
Ransomware
Compositionality
computer architecture
composability
Cryptography
resilience
Metrics
Human behavior
pubcrawl
security
collaboration
1
2
3
4
5
6
7
8
9
…
next ›
last »