Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
On Building a Vulnerability Dataset with Static Information from the Source Code
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
composability
codes
Compositionality
Data Breach
Databases
Human behavior
Industries
machine learning
Metrics
pubcrawl
Resiliency
software metrics
software security
static analysis
static code analysis
vulnerability detection
biblio
Secure Dynamic Skyline Queries Using Result Materialization
Submitted by grigby1 on Tue, 05/03/2022 - 3:57pm
Conferences
Data engineering
Databases
encryption
Market research
Medical services
predictability
Protocols
pubcrawl
resilience
Resiliency
Scalability
searchable encryption
Security Heuristics
Skyline queries
biblio
Security and Privacy Trade-Offs in CPS by Leveraging Inherent Differential Privacy
Submitted by grigby1 on Wed, 04/20/2022 - 10:45am
control systems
Covariance matrices
CPS Privacy
Databases
data privacy
Human Factors
privacy
pubcrawl
Sensitivity
uncertainty
biblio
ECG Signal Classification Using Convolutional Neural Networks for Biometric Identification
Submitted by grigby1 on Tue, 04/19/2022 - 10:44am
Metrics
Telecommunications
Spectrogram
signal processing security
Signal processing algorithms
Resiliency
resilience
pubcrawl
privacy
pattern classification
Biological system modeling
Electrocardiography
ECG signal processing
Databases
convolutional neural network
composability
classification
biometrics (access control)
biometrics
biblio
A Tree-Based Machine Learning Methodology to Automatically Classify Software Vulnerabilities
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Manuals
Software Vulnerability categorization
Software
security weaknesses
security
Resiliency
resilience
random forests
pubcrawl
policy-based governance
Conferences
machine learning
Human behavior
Hardware
gradient boosting
Forestry
Decision trees
Databases
Cyber-security
biblio
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Predictive models
Software
Semantics
security weaknesses
Security entity
Security database
Resiliency
resilience
pubcrawl
Conferences
policy-based governance
Measurement
knowledge graph
Knowledge engineering
Human behavior
Graph attention network
Entity relation prediction
Databases
biblio
Checking Network Security Policy Violations via Natural Language Questions
Submitted by grigby1 on Mon, 04/18/2022 - 10:53am
Big Data
chatbots
Databases
Organizations
policy-based governance
programming
pubcrawl
security
security policies
telecommunication traffic
biblio
An Intrusion Detection and Prevention System for DDoS Attacks using a 2-Player Bayesian Game Theoretic Approach
Submitted by grigby1 on Wed, 04/13/2022 - 2:55pm
game theory
search engines
Resiliency
resilience
pubcrawl
process control
Metrics
Intrusion Detection
Intent Objective and Strategy
Intent and Strategies
Human behavior
Games
game theoretic security
distributed denial of service attacks
denial-of-service attack
DDoS Attack Prevention
Databases
Computational modeling
composability
Attacker's Objective
Scalability
Predictive Metrics
Human Factors
biblio
Systematic Mapping on Prevention of DDoS Attacks on Software Defined Networks
Submitted by grigby1 on Wed, 04/13/2022 - 2:54pm
composability
DDoS Attack Prevention
Software-Defined Networks
distributed denial of service
denial-of-service attack
Publishing
Systematics
Metrics
network security
pubcrawl
Databases
Protocols
internet
Software
Resiliency
resilience
Human behavior
biblio
Threats and data trading detection methods in the dark web
Submitted by grigby1 on Tue, 04/12/2022 - 12:13pm
pubcrawl
Human behavior
Cryptography
Databases
process control
Cyber-security
Data Security
Buildings
visualization
Intelligent systems
cyber-attacks
dark web
drugs
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »