Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Determining proximal geolocation of IoT edge devices via covert channel
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
IoT edge devices
trusted router
tools
telecommunication channels
smart meters
Scalability
Routing protocols
roadside speed sensors
Resiliency
radiation sensors
pubcrawl
Protocols
pressure sensors
IP packets
IP networks
chemical sensors
Internet Protocol
Internet packet router authentication
Internet of Things
internet
Intelligent sensors
Geology
geolocation techniques
geolocation authentication
geolocation
covert channels
covert channel
computer network security
Compositionality
command and control center
biblio
An interoperable approach for Sensor Web provenance
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Sensor Web
provenance information
provenance model
pubcrawl
Resiliency
Semantic Web
Semantic Web technologies
sensor observation data
sensor observations
Provenance
Sensor Web domain vocabularies
Sensor Web provenance
usability
Vocabulary
W3C
W3C PROV
W3C PROV data model
complex information space
OWL
open systems
Ontologies
Metrics
linked data approach
Linked Data
interoperable approach
interoperability
internet
Human Factors
Human behavior
Data models
data analysis
Compositionality
composability
biblio
A scientific data provenance harvester for distributed applications
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
pubcrawl
Metrics
Performance
performance measurements
prestage provenance
process history
ProvEn
Provenance
Provenance Environment
provenance related information
provenance store
internet
relational databases
Resiliency
Science Integrated end-to-end Performance Prediction
scientific applications
scientific data provenance harvester
scientific information systems
Syntactics
tabular job management provenance
US Department of Energy Office of Science
electronic data interchange
Accelerated Climate Modeling
Accelerated Climate Modeling for Energy project
Atmospheric measurements
Atmospheric modeling
Biological and Environmental Research
cognitive science
composability
data analysis
Data models
Distributed Applications
Earth System Modeling program
Energy project
environmental factors
experimental rationale
Extreme Scientific Workflows project
file based evidence
HAPI
Harvester Provenance Application Interface syntax
harvesting
Human behavior
biblio
Blockchain-Assisted Information Distribution for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Access Control
authentication
composability
Compositionality
contracts
Human behavior
Human Factors
Identity management
internet
Metrics
Provenance
provenance verification
pubcrawl
Public key
Resiliency
sensors
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
« first
‹ previous
…
74
75
76
77
78
79
80
81
82
…
next ›
last »