Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ontologies
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
Semantics
Fuzzy Cryptography
partial agreement
Pareto-optimal solutions
Fuzzy sets
fuzzy ontology reasoning task
fuzzy ontologies
blockchain smart contracts
best satisfiability degree
Pareto optimisation
blockchain systems
fuzzy reasoning
Ethereum blockchain
inference mechanisms
Scalability
cognition
contracts
smart contracts
fuzzy set theory
cryptocurrencies
ontologies (artificial intelligence)
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Ontologies
biblio
A Global IoT Device Discovery and Integration Vision
Submitted by aekwall on Mon, 11/30/2020 - 11:01am
IoT device discovery
sensors
Resiliency
pubcrawl
policy governance
Ontologies
Metrics
metadata
meta data
IoT device registration
IoT device query
IoT device providers
IoT device metadata
IoT device intergartion
authentication
IoT device description
IoT blockchain
IoT application development
IoT
Internet-scale Computing Security
Internet of Things
Human behavior
global IoT device discovery
GIDDI blockchain
distributed IoT blockchain ledger
Cryptography
composability
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
inference mechanisms
Information Reuse and Security
weakness class
vulnerability class
security vulnerability ontology model
public information systems
knowledge inference
information security public databases
Inference Rules
industry public standards
CWE
capec
CVE
Compositionality
security of data
Communication networks
Ontology
ontologies (artificial intelligence)
finance
Economics
Vulnerability
Databases
standards
pubcrawl
Resiliency
security
Ontologies
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
Resiliency
NIST
Ontologies
ontologies (artificial intelligence)
Ontology
open systems
power engineering computing
pubcrawl
reasoning techniques
resilience
Metrics
security
simulations
smart grid stakeholders
Smart Grids
smart power grids
Unified modeling language
university collaborators
US National Institute of Standards-and-Technology
cyber-physical system
cyber physical systems
Human Factors
Human behavior
privacy
automated decision making
cognition
composability
CPS framework model
CPS modeling
CPS Privacy
cyber-physical systems
Decision Making
decision support
Decision support systems
governance collaborators
grid topologies
industry collaborators
inference mechanisms
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
biblio
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Submitted by aekwall on Mon, 11/11/2019 - 10:48am
Android mobile platform
User input
user data collection
private information
privacy-relevant app categories
privacy policy claims
privacy policy alignment
privacy leaks detection
Mobile privacy policy
Humanoid robots
graphical user interfaces
app producers
app code
Androids
Scalability
Android ecosystem
Android apps
Android applications
Android application
privacy protection
Privacy Policies
Layout
privacy
pubcrawl
Human behavior
mobile computing
Ontologies
data privacy
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »