Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Algorithms
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
Application Profiling From Encrypted Traffic
Submitted by grigby1 on Mon, 04/25/2022 - 3:24pm
ML
Traffic Forensic
Entertainment industry
Application Profiling
Traffic analysis
Inspection
Algorithms
deep packet inspection
education
pubcrawl
Forensics
real-time systems
telecommunication traffic
Protocols
Scalability
Resiliency
resilience
biblio
AI Next Campaign
Submitted by willirn1 on Tue, 10/26/2021 - 6:25pm
AI
C3E
AI technology
cyber attack
supply chains
Microbiologic Systems
R&D
adaptability
Algorithms
Artificial Intelligence
cyber
data
Interface
Tech-Foundations
biblio
"Digital Bombs" Neutralization Method
Submitted by grigby1 on Tue, 09/21/2021 - 3:52pm
malware
Weapons
static analysis
Resiliency
resilience
pubcrawl
privacy
Performance analysis
Metrics
Malware Analysis
Algorithms
Human behavior
graph theory
Grammar
dynamic control automaton
dynamic analysis
control graph
checkpoints
automata
Analytical models
biblio
PAM PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 2:26pm
Approximation algorithms
virtual machine security
virtual machine
virtual machine migration
Policy-Aware Data Centers
Algorithms
virtual machine placement
optical switches
data centers
Cyber Physical System
Cryptography
Virtual machining
composability
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Submitted by aekwall on Mon, 05/03/2021 - 1:06pm
return oriented programming
Algorithms
composability
computer architecture
Human Factors
Instruction sets
Payloads
pubcrawl
Registers
Resiliency
rop attacks
Scalability
Task Analysis
Windows
biblio
Behavioral malware analysis algorithm comparison
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
tools
behavioral malware analysis
Sensitivity
Predictive Metrics
behavioral analysis
computer viruses
Malware Analysis
privacy
testing
computer security
Prediction algorithms
malware
Metrics
Algorithms
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
machine learning algorithms
malware detection
biblio
Matlab Simulation of Algorithms for Face Detection in Video Surveillance
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video image
Viola-Jones waterfall method
resource optimization
Kanade-Lucas-Tomasi algorithm
Hausdorff distance
geometric models
faces
Face detection
detection problems
MATLAB
face recognition
MatLab simulation
video surveillance system
video surveillance
feature extraction
object detection
video signal processing
object tracking
digital camera
Cameras
optimisation
Metrics
Algorithms
detection
pubcrawl
Human behavior
Resiliency
biblio
Efficient Exploration of Algorithm in Scholarly Big Data Document
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
document handling
Metadata Discovery Problem
TFIDF
textual content
Steaming
Software algorithms
Sentence Extractor
self-learning
searching algorithms
search engine
scholarly digital documents
scholarly Big Data document
Scholarly big data
Pseudo codes
Portable document format
indexing
Scalability
AlgorithmSeer
Algorithms
algorithm representations
algorithm indexing
algorithm database
search engines
Data mining
metadata
internet
composability
pubcrawl
Resiliency
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
A Graph-Based Model for Malicious Software Detection Exploiting Domination Relations Between System-Call Groups
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Algorithms
Compositionality
detection
graph theory
graphs
Human behavior
malware
Malware Analysis
Predictive Metrics
privacy
pubcrawl
Resiliency
Scientific Computing Security
security
Systems
1
2
3
4
next ›
last »