Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
distributed energy trading schemes
composability
green computing
Smart Grids
Security analysis
power system interconnection
renewable energy sources
power markets
credibility-based equity proof mechanism
distributed energy sources
Distributed energy trading
smart power grids
efficient energy renewable trading scheme
electricity market trading model
energy internet
Energy storage
Energy systems
energy trading market
privacy protection
secure energy renewable trading scheme
smart grid consumer privacy
Resiliency
privacy
security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Cryptography
Indexes
data privacy
Scalability
internet
Computational modeling
distributed power generation
power engineering computing
power system security
Smart Grid
biblio
Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution)
Submitted by grigby1 on Tue, 11/17/2020 - 3:00pm
IoMT
ultrasonic waves
ultrasonic materials testing
ultrasonic based nondestructive testing
testing
smart things
Scalability
Resiliency
resilience
pubcrawl
Probes
network technology
military equipment
military computing
materials defect analysis
machine intelligence
Acoustics
IoBT NDT and Machine Intelligence
iobt
Internet of Things
Internet of Military of Things
Internet of Battle of Things
internet
Intelligent sensors
Inspection
information technology
Human Factors
embedded technology
embedded systems
defence industry
computer architecture
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:59pm
Internet of battlefield things
security of data
security counter measure
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Monitoring
IoBT systems
IoBT control
iobt
Internet of Things
battlefield services
internet
information technology
Human Factors
Games
game theory
game theoretic modeling
cyberattack
cyber deception
Computational modeling
command and control systems
command and control
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
QoS monitoring
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
networking conditions
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
Internet of Things
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
application traffic
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
iobt
visualization
sharding approach
Sharding
Scalability
pubcrawl
NS-3 Simulation
networked battlefield scenario
mission-critical IoBT environment
Mission critical systems
military computing
military communication
military applications
lightweight blockchain
IoBT devices
blockchain
Internet-of-Battlefield-Things
Internet of Things
Internet of battlefield things
internet
Human Factors
Heuristic algorithms
FastChain simulator
drones
Decentralized Consensus
Cryptography
Computational modeling
communication resources
blockchain enabled IoBT scenarios
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 2:13pm
pubcrawl
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
feature extraction
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
detection method
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
AI Poisoning
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 2:12pm
resilience
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
lower inference accuracy
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
deep neural network applications
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
abusive data collection
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
biblio
Meeting the Demand: Building a Cybersecurity Degree Program With Limited Resources
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
cybersecurity program accreditation criteria
universities
security of data
publicized cyber-attacks
pubcrawl
privacy
internet
Industries
further education
Educational institutions
educational courses
education
Computational modeling
cybersecurity education
cybersecurity degree program
cybersecurity curriculum
cybersecurity courses
cyber physical systems
computer security
Computer Science programs
computer science education
computer science
computer aided instruction
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »