Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Toward Interactive Self-Annotation For Video Object Bounding Box: Recurrent Self-Learning And Hierarchical Annotation Based Framework
Submitted by grigby1 on Mon, 03/06/2023 - 4:03pm
Reinforced Learning from Human Feedback
Human Factors
Labeling
Detectors
Training data
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
machine learning
Training
tools
biblio
CARE: Lightweight Attack Resilient Secure Boot Architecture with Onboard Recovery for RISC-V based SOC
Submitted by aekwall on Thu, 12/01/2022 - 3:37pm
malware
Resilient Security Architectures
smart recovery
small embedded and IoT devices security system
RISC-V
HW/SW co-design
hardware and system security
attack resilient
Secure Boot
Hardware
Performance analysis
Prototypes
Resiliency
pubcrawl
tools
performance evaluation
Internet of Things
SoC
biblio
Process trees & service chains can serve us to mitigate zero day attacks better
Submitted by grigby1 on Thu, 12/01/2022 - 1:21pm
standards
Computer graphics
users
Zero day attacks
human computer interaction
Data visualization
defense
computer security
composability
tools
Software
Resiliency
resilience
Metrics
pubcrawl
machine learning
cyber security
biblio
End Users Can Mitigate Zero Day Attacks Faster
Submitted by grigby1 on Thu, 12/01/2022 - 1:20pm
tools
cyber security
machine learning
IP networks
pubcrawl
Metrics
resilience
Resiliency
Cryptography
composability
computer security
defense
Data visualization
human computer interaction
Zero day attacks
users
biblio
Investigation of Computer Incidents as an Important Component in the Security of Maritime Transportation
Submitted by grigby1 on Fri, 11/25/2022 - 4:48pm
Transportation
modern shipping
Policy Based Governance
pubcrawl
Reliability
resilience
Resiliency
reverse engineering
Scalability
Science of Security
security system
Software
tools
Metrics
automated information system
collaboration
composability
computer incident
computer security
cyber-attacks
forensic science
framework
Human behavior
Human Factors
information security
malware
biblio
Automatically Customizing Static Analysis Tools to Coding Rules Really Followed by Developers
Submitted by aekwall on Fri, 11/18/2022 - 2:26pm
Software
tools
Conferences
pubcrawl
Resiliency
Human behavior
composability
encoding
Industries
static analysis
programming
static code analysis
Coding Convention
Coding Rule
empirical study
static analysis tools
biblio
Malware Detection and Security Analysis Capabilities in a Continuous Integration / Delivery Context Using Assemblyline
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
Python
YARA
software analysis
PoetRAT
Malware Scoring
CI/CD
CCCS
Assemblyline
Security by Default
Ubuntu
detection
tools
malware
Computer crime
Scalability
Safety
Conferences
Resiliency
resilience
pubcrawl
security
risk management
biblio
SEFlowViz: A Visualization Tool for SELinux Policy Analysis
Submitted by grigby1 on Fri, 11/18/2022 - 1:18pm
tools
security
pubcrawl
policy-based governance
collaboration
Data mining
visualization
Security Policies Analysis
Communication Systems
Neo4j
Readers-Writers Flow Model
seandroid
selinux
visual databases
biblio
Generative Adversarial Networks: A Likelihood Ratio Approach
Submitted by grigby1 on Wed, 11/02/2022 - 11:58am
tools
Training
Neural networks
pubcrawl
Metrics
resilience
Resiliency
Scalability
Measurement
Complexity theory
generative adversarial networks
Generative Adversarial Learning
character recognition
Generative Networks
Likelihood Ratio
biblio
Chi-Square Detection for PVD Steganography
Submitted by grigby1 on Thu, 10/20/2022 - 3:22pm
tools
pubcrawl
Metrics
privacy
composability
Histograms
Steganography
steganalysis
chi-square test
pixel-value differencing steganography
steganography detection
1
2
3
4
5
6
7
8
9
…
next ›
last »