Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Novel Defense Method against Audio Adversarial Example for Speech-to-Text Transcription Neural Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
computer security
speech-to-text transcription neural networks
speech-to-text
speech synthesis
Speech recognition
Sandbox Method
sandbox approach
Neural networks
defense method
Deep Speech
data representation
learning (artificial intelligence)
audio adversarial example
adversarial example
neural nets
sandboxing
composability
deep learning
policy-based governance
pubcrawl
collaboration
security of data
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Human behavior
Virtualization
Safety
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
innovative safe cloud computing design
information management
identification mechanism
Human Factors
access management
Fingerprint recognition
encoding
Cryptography
computer security
collaboration
cloud computing security
Cloud Computing
Ciphers
biometrics (access control)
biometric knowledge
biometric coding
biometric
biblio
Targeted Poisoning Attacks on Social Recommender Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
computer security
Human Factors
Information systems
Motion pictures
optimization
pubcrawl
recommender systems
Resiliency
Scalability
Social network services
Sparse matrices
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 11:52am
Social network services
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Venn Diagram
Internet of Things
Social Media Mining
Media User Network
interactive visualization
Data visualization
Cybersecurity
computer science
Big Data
computer security
Scalability
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Incentive Model
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Moral Hazard
monitoring signals
Insurance
information sharing output
information management
security of data
Incentive mechanism
incentive contract
ethics
Environment monitoring
cybersecurity information sharing
cybersecurity information haring
cyber risk transfer
Cyber Insurance
contracts
computer security
Scalability
risk management
Monitoring
biblio
A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
machine learning
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Self-Attention mechanism
Scalability
Labeling
Hidden Markov models
feature extraction
entity recognition
CRF
Context modeling
BiLSTM
Cybersecurity
computer security
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
biblio
Solving Cybersecurity Problem by Symmetric Dual-Space Formulation—Physical and Cybernetic
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
symmetric dual-space
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Wireless communication
symmetric Maxwell Equation
symmetric dual-system
symmetric dual-space formulation
security of data
Maxwell equations
Maxwell Equation
Fourier transforms
Fourier transform
electronic warfare
Electromagnetics
cybersecurity problem
Broadband antennas
5G mobile communication
5G mobile
Cybersecurity
computer security
Scalability
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »