Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security domain
biblio
A Study of Identifier Resolution Security Strategy Based on Security Domains
Submitted by grigby1 on Fri, 11/25/2022 - 5:48pm
pubcrawl
Technological innovation
security domain
security
Science of Security
Scalability
risk analysis
Resiliency
resilience
collaboration
Policy Based Governance
Metrics
internet
industrial internet
identifier resolution security
Human Factors
Human behavior
composability
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 4:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Implementation of Multi-level Security Domain Scheme for Embedded Computer Based on MILS Architecture
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
security domain
system crash
multiple embedded computers
multilevel security domain dynamic management
MILS architecture
MILS
migration cross partitions
hardware crash
functional failure
embedded computer
data isolation
access control lists
Access Control
security requirements
computer security
Metrics
Computational modeling
composability
pubcrawl
Resiliency
computer architecture
embedded systems
authorisation
biblio
Hierarchical learning for automated malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
pubcrawl
machine learning solutions
malicious file detection
malicious files automated classification
malware
malware classification
malware label
Metrics
nonhierarchical classifier
pattern classification
privacy
machine learning algorithms
resilience
Resiliency
security domain
signature augmentation
Support vector machines
system monitoring
Training
Win32
Win64
Formal Specification
automated malware classification
binary error rate
classification models
commercial anti-virus products
Companies
computer security
computer viruses
corporate computers
family variant
feature extraction
anti-virus companies
hierarchical labels
hierarchical learning algorithms
Hierarchical Machine Learning
hierarchical structure
home computers
Human behavior
industrial-scale malware dataset
label hierarchy achieves
learning (artificial intelligence)
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense