Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Classifying Fake News Articles Using Natural Language Processing to Identify In-Article Attribution as a Supervised Learning Estimator
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
news article
information accuracy
key linguistic characteristics
learning (artificial intelligence)
Linguistics
machine learning
mainstream media platforms
Media
Metrics
natural language processing
Influence Mining
pattern classification
pubcrawl
radio news
resultant process precision
social media conduits
social media platforms
social networking (online)
supervised learning estimator
tools
fake news articles
Attribution Classification
Bayes methods
Bayesian machine learning system
classifier performance
component
composability
deceptive content
Decision Making
fake news
attribution
fake news classifier
fake news detector
fake news identification study
fake news stories
feature extraction
Grammar
Human behavior
in-article attribution
biblio
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment
Submitted by aekwall on Mon, 08/24/2020 - 11:46am
machine learning
Autonomic Security
secure resources
Power and Performance Management
on-demand computing capabilities
cloud computing systems
Big Data Analytics
autonomic resource management
Power demand
power consumption
High performance computing
security of data
tools
resource management
composability
pubcrawl
Resiliency
embedded systems
security
Hardware
Cloud Computing
Monitoring
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
WASPP: Workflow Automation for Security Policy Procedures
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
organisational aspects
workflow automation
WASPP
University networks
tools
Systematics
suspicious event
SoC
security policy procedures
Security Operations Center
security of data
pubcrawl
Pipelines
Information Reuse and Security
Monitoring
information security specialists
human intuition
generalized event response solutions
composability
automation
Automated Response Actions
automated event response solutions
administrative policies
ad hoc solutions
Resiliency
Compositionality
biblio
Adaptive and Intelligible Prioritization for Network Security Incidents
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
risk management
static calculations
prioritization model management
network security incidents
incident prioritization
adaptive learning
adaptive incident prioritization
Communication networks
Automated Response Actions
Anomaly Detection
automation
security of data
tools
composability
pubcrawl
Resiliency
network security
cyber security
Adaptation models
Task Analysis
security
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 10:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Metrics
android encryption
repackaged apps
online markets
method information
malicious codes
intent
implicit intents
code obfuscation techniques
Cloning
clone detection
class method
Android app clones detection
Andorid app
Code Obfuscation
Scalability
Android ecosystem
reverse engineering
Android (operating system)
Data mining
tools
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
malware
encryption
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »