Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Detection of Botnets in IoT Networks using Graph Theory and Machine Learning
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
malware
PSI-Graph
function call graphs
exploratory data analysis
Resiliency Coordinator
Botnet detection
Malware Analysis
graph theory
Technological innovation
botnet
IoT
Market research
Internet of Things
static analysis
sensors
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
information security
biblio
Detecting Malware Using Graph Embedding and DNN
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
data structures
Resiliency Coordinator
feature vector
Malware Analysis
graph embedding
graph theory
Markov processes
Deep Neural Network
malware detection
malware
deep learning
privacy
Data models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
information security
biblio
PbV mSp: A priority-based VM selection policy for VM consolidation in green cloud computing
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
composability
VM consolidation
Service-level Agreement (SLA)
priority-based VM selection
PBVmSP
green cloud computing
Green products
Internet-scale Computing Security
Pricing
energy consumption
Compositionality
Measurement
signal processing
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
information security
Cloud Computing
biblio
Analysis of the Optimized KNN Algorithm for the Data Security of DR Service
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
Compositionality
smart energy
IoT device
supply and demand
Costs
system integration
Memory
supervised learning
Internet-scale Computing Security
demand response
denial-of-service attack
KNN
Cloud Computing
composability
information security
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense
Submitted by grigby1 on Fri, 09/08/2023 - 10:24am
privacy
Vehicle-to-everything
IoV(Internet of vehicle)
Human Factors
moving target defense
anonymous authentication
vehicle dynamics
information security
Internet of Vehicles
security
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Application of Intelligent Transportation System Data using Big Data Technologies
Submitted by grigby1 on Fri, 09/08/2023 - 10:08am
Compositionality
Management information systems
Intelligent Public Transportation
business intelligence
Big Data Analytics
Soft sensors
intelligent data
Decision support systems
Technological innovation
Intelligent Transportation Systems
information security
Data Security
composability
Big Data
Scalability
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
The Block Chain Technology to protect Data Access using Intelligent Contracts Mechanism Security Framework for 5G Networks
Submitted by grigby1 on Fri, 09/08/2023 - 10:07am
composability
Mechanism Security
Management
Application and Services
5g network
blockchains
intelligent data
Compositionality
Data Security
network security
information security
5G mobile communication
data privacy
privacy
Scalability
Resiliency
resilience
pubcrawl
blockchain
security
biblio
Research on Intellectual Property Protection of Artificial Intelligence Creation in China Based on SVM Kernel Methods
Submitted by grigby1 on Thu, 09/07/2023 - 3:59pm
Resiliency
orthogonal design
KSVM
Analysis of variance
Data preprocessing
Measurement
Law
composability
intellectual property
information security
resilience
policy-based governance
pubcrawl
Artificial Intelligence
Support vector machines
security
machine learning
biblio
Data Manipulation and Digital Forensics Analysis on WhatsApp Application
Submitted by grigby1 on Fri, 09/01/2023 - 3:18pm
social networking (online)
social media forensics
instant messaging applications
data manipulation
Freeware
Internet telephony
Human Factors
mobile forensics
Instant messaging
information forensics
information security
Digital Forensics
Databases
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A fuzzy decision tree reasoning method for network forensics analysis
Submitted by grigby1 on Fri, 09/01/2023 - 3:18pm
Forensics
reasoning method
Network forensics analysis
Fuzzy decision tree
Human Factors
Current measurement
information forensics
Systematics
computer networks
information security
network security
computer science
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »