Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks
Submitted by grigby1 on Wed, 05/05/2021 - 12:43pm
programming
tools
Structured Query Language
SQL Injection attacks
SQL injection
security
Safe Coding
Resiliency
resilience
pubcrawl
collaboration
policy-based governance
Metrics
Input clustering
Human Factors
Human behavior
encoding
Databases
Complex Number System
biblio
An interpretable fuzzy system in the on-line signature scalable verification
Submitted by aekwall on Mon, 05/03/2021 - 1:14pm
Resiliency
pubcrawl
Databases
Fuzzy sets
fuzzy systems
Scalability
Predictive Metrics
Compositionality
Forgery
scalable verification
interpretability
flexible fuzzy system
Frequency selective surfaces
identity verification
IT systems security
on-line signature
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Databases
preparation and pre-response category
Planning
investigation process model
harmonized DBFI process
design science research methodology
database forensics
database forensic investigation processes
Database forensic investigation
analysis and reconstruction category
acquisition and preservation category
Terminology
information forensics
Adaptation models
digital data
Data models
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
Servers
database management systems
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
software engineering
software installation
Sociotechnical
sabotage
Materials
insider threats indicators
insider threat cases
insider IT sabotage
indicators
Educational institutions
chronological timelines
attack planning
Weapons
insider threat
Metrics
information technology
Databases
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Facial Expression Recognition Based on Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:01pm
feature extraction
Support vector machines
Resiliency
resilience
pubcrawl
object detection
Metrics
image recognition
image classification
Human behavior
graph theory
Graph Neural Network
graph convolutional neural network
fully automatic facial expression recognition
facial recognition
facial landmark detection
facial expression recognition classification
facial expression recognition
facial expression databases
face recognition
face landmarks detection
Face
emotions
emotion recognition
Databases
convolutional neural networks
convolutional neural nets
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
Integrity Auditing with Attribute based ECMRSA Algorithm for Cloud Data Outsourcing
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
Cloud Computing
Servers
abe
security
Protocols
Resiliency
pubcrawl
Cryptography
Databases
Predictive Metrics
Compositionality
data integrity
outsourcing
encryption audits
data sharing
data auditing
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »