Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
evaluation
biblio
Enhancing Source-Location Privacy in IoT Wireless Sensor Networks Routing
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Routing
Source Location Privavy
Costs
Location Privacy in Wireless Networks
location privacy
WSN
evaluation
wireless networks
energy consumption
Compositionality
component
encryption
composability
Wireless communication
wireless sensor networks
Protocols
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Cyber-Security Training Evaluation Metrics
Submitted by grigby1 on Wed, 07/13/2022 - 1:18pm
Measurement
Training
Scoring
Scalability
Resiliency
resilience
pubcrawl
Proposals
policy governance
Organizations
Metrics
collaboration
Human behavior
Gamification
evaluation
cybersecurity education
Cyber-security training
Cyber-ranges
Conferences
Computer crime
composability
biblio
Evaluation of the Executional Power in Windows using Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
privacy
Windows
Turing-completeness
tools
security
ROP chain
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
rop attacks
evaluation
Conferences
automatic exploit
Aerospace electronics
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
Submitted by grigby1 on Mon, 08/02/2021 - 3:40pm
assurance
Conferences
embedded systems
evaluation
Hardware
Measurement
Metrics
metrics testing
pubcrawl
Quantitative Security
security
security level
security measurement
Security Metrics
Software
taxonomy
biblio
Research on Information Security Evaluation Based on Artificial Neural Network
Submitted by aekwall on Thu, 05/13/2021 - 11:30am
artificial intelligence security
artificial neural network
Artificial Neural Networks
cyber physical systems
evaluation
Information encryption
information security
Metrics
policy-based governance
pubcrawl
Resiliency
biblio
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
programming
utility
term frequency
software reliability
software quality
security
Resiliency
resilience
Reliability engineering
pubcrawl
API
evaluation
Current measurement
correctness
Conferences
Compositionality
application programming interface
APIs
API Recommendation
biblio
BenchPress: Analyzing Android App Vulnerability Benchmark Suites
Submitted by grigby1 on Fri, 08/14/2020 - 11:43am
Android security analysis tools
application programming interface
UBCBench
tool developers
temperature 227.0 K
stack overflow
security-related APIs
Representativeness
ICCBench
Ghera
Empirical Software Engineering
DroidBench
BenchPress
benchmark
Android-specific benchmark suites
security of data
Android app vulnerability benchmark suite analysis
Android app development
Android (operating system)
evaluation
android
Compositionality
application program interfaces
APIs
mobile computing
Resiliency
resilience
pubcrawl
security
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Research of Computer Network Security Evaluation Based on Backpropagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Backpropagation
Neural Network Security
Virus
prediction
loopholes
evaluation
computer viruses
computer networks
computer network security evaluation
BP Neural Network
backpropagation neural network
security
Biological neural networks
Metrics
neural nets
Communication networks
Mathematical model
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
1
2
3
next ›
last »