Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Analyzing Initial Design Theory Components for Developing Information Security Laboratories
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Cryptography
infosec lab
design Theory
action design research
policy governance
Resiliency
computer theory
Laboratories
Compositionality
composability
Training
privacy
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
Research on Network Confrontation Information Security Protection System under Computer Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Computational modeling
network confrontation
policy governance
computer
Resiliency
data science
object detection
computer theory
Compositionality
composability
Adaptation models
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
Training
deep learning
biblio
The Design and Realization of Information Security Technology and Computer Quality System Structure
Submitted by grigby1 on Fri, 04/28/2023 - 3:58pm
Routing
research and analysis
information security technology
Design and implementation
computer quality architecture
policy governance
Resiliency
computer theory
Design methodology
computer networks
Compositionality
computer architecture
composability
system-on-chip
Hardware
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
Research on the technical application of artificial intelligence in network intrusion detection system
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
information security
security
Neural networks
pubcrawl
network security
privacy
Artificial Intelligence
composability
Compositionality
surveillance
information processing
computational intelligence
scientific computing
network intrusion detection
biblio
Research on applied strategies of business financial audit in the age of artificial intelligence
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
information security
security
Monitoring
pubcrawl
Artificial Intelligence
composability
Compositionality
uncertainty
data analysis
computational intelligence
risk management
Compounds
audit
biblio
VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 11:53am
composability
Weight Graph
Code Variant
vulnerability detection
codes
coding theory
Sensitivity
Syntactics
Semantics
Compositionality
Cryptography
Conferences
Resiliency
resilience
Metrics
pubcrawl
security
information security
deep learning
biblio
Sequential Statistical Analysis-Based Method for Attacks Detection in Cognitive Radio Networks
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
Force
statistical analysis
radio transmitters
Intrusion Detection
pubcrawl
machine learning
information security
Resiliency
emulation
cognitive radio networks
Sequential analysis
sequential statistical analysis
Cognitive Radio Security
biblio
Machine Learning to Identify Bitcoin Mining by Web Browsers
Submitted by grigby1 on Fri, 04/14/2023 - 4:15pm
bitcoin
Web Cryptojacking
Ryptojacking Kidnapping
Monero
JavaScript Cryptojacking
Blocklists
Browser Security
Resiliency
Coinhive
Artificial Neural Networks
information security
Compositionality
Browsers
resilience
Metrics
Human behavior
pubcrawl
machine learning algorithms
machine learning
biblio
Blockchain-Oriented Privacy Protection with Online and Offline Verification in Cross-Chain System
Submitted by grigby1 on Fri, 04/14/2023 - 4:13pm
Access Control
blockchain
blockchain security
blockchains
data privacy
information security
privacy
privacy protection
pubcrawl
Resiliency
Scalability
smart contracts
biblio
Research on Trust Measurement of Terminal Equipment Based on Device Fingerprint
Submitted by grigby1 on Fri, 04/14/2023 - 4:13pm
blockchain
blockchain security
blockchains
Complexity theory
device fingerprint
Fingerprint recognition
Hardware
information security
Libraries
machine learning
pubcrawl
Resiliency
Scalability
Software
trust measure
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »