Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Designing virus-resistant networks: A game-formation approach
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
optimal network topology
worst-case Nash equilibrium
Viruses (medical)
virus-resistant network design
virus security
virus resiliency
telecommunication network topology
Stability analysis
security
pubcrawl170108
pubcrawl170107
price of anarchy
Peer-to-peer computing
autonomous system
network topology
Nash Equilibrium
Nash equilibria
internet
global optimum
Games
game-formation approach
game theory
decentralized fashion
computer viruses
computer network security
biblio
"Cross-Device Consumer Identification"
Submitted by grigby1 on Thu, 02/23/2017 - 11:58am
gradient boosting decision trees
Xgboost
Training
random forest algorithm
Random Forest
pubcrawl170105
Predictive models
personal information
performance evaluation
learning (artificial intelligence)
IP networks
internet
ICDM2015 contest
advertising companies
GBM
GBDT
Ensemble
deep learning
Decision trees
Data models
cross-device consumer identification
consumer identity
consumer behaviour
Computers
Computational modeling
advertising data processing
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 11:39am
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
"Linux XIA: an interoperable meta network architecture to crowdsource the future internet"
Submitted by grigby1 on Tue, 02/21/2017 - 11:24am
Meta network architecture
zFilter
XIA
TCP/IP
Serval
Runtime
Routing
pubcrawl170103
Protocols
open systems
network evolution
missing catalyst
broader community
Linux XIA
Linux kernel
Linux
Kernel
IP networks
interoperable meta network architecture
interoperability
Internet architecture
internet
future Internet architecture
disparate architectures
biblio
"On scaling software-Defined Networking in wide-area networks"
Submitted by grigby1 on Tue, 02/21/2017 - 11:22am
computer architecture
domain name system
internet
IP networks
next-generation network design
OpenFlow
pubcrawl170103
Reliability
Scalability
SDN
Servers
software defined networking
software-defined networking
software-defined wide-area networks
wide area networks
« first
‹ previous
…
80
81
82
83
84
85
86
87
88
…
next ›
last »