Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
malware
Power system protection
ML techniques
intrusion detection and prevention systems
Intrusion Detection and Prevention System
IDPS systems
cyber threat detection
AI
APT attack
Advanced Persistent Threat (APT)
power utilities
Smart Grids
APT
advanced persistent threat
cyber threats
Metrics
tools
computer security
Big Data
NIST
smart power grids
Smart Grid
power engineering computing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Artificial Intelligence
machine learning
security of data
learning (artificial intelligence)
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Forensic Analysis of Third Party Location Applications in Android and iOS
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
operating systems
mobile forensics
location services
application analysis
iOS Security
Mobile Security
Global Positioning System
Humanoid robots
Androids
Forensics
tools
Compositionality
Metrics
smart phones
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
A Formal Modeling and Verification Framework for Service Oriented Intelligent Production Line Design
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
service-oriented architecture
performance constraints
production engineering computing
pubcrawl
quality of service
resilience
Resiliency
service oriented
service oriented intelligent production line design
model-centric way
simulations
Software Architecture
Task Analysis
tools
Unified modeling language
verification method
web services
formal verification
application requirements
complex application
composability
CPS modeling
existing modeling methods
formal modeling
formal simulation verification framework
Formal Specification
Adaptation models
independent equipment network integration
Intelligent production line
large scale high-performance system
Mathematical model
Metrics
model and verification
model-based service-oriented integration approach
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
health domain Web pages
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
supervised learning
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
text analysis
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
security of data
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
biblio
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
security forums
learning (artificial intelligence)
machine learning
machine learning-based crawler
Monitoring
Open Source Software
open-source tools
pubcrawl
security
language models
security Web sites
service-oriented architecture
social networking (online)
social web
statistical language modelling techniques
Task Analysis
telecommunication security
tools
hacker forums
crawler architecture
Crawlers
crawling architecture
cyber security
cyber threat intelligence
cyber-security information
dark web
data harvesting
Computer crime
harvested information
Human behavior
Human Factors
information gathering task
Internet of Things
IoT
IoT-related cyber-threat intelligence
biblio
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
Metrics
tools
Somewhat Homomorphic Encryption
Signal processing in encrypted domain
QR decomposition
pubcrawl
privacy-preserving outsourcing computation
privacy protection
privacy
outsourced QR decomposition
Compositionality
Matrix decomposition
homomorphic encrypted domain
Gram-Schmidt process
Gram Schmidt process
encryption
decomposition
data privacy
cyber physical systems
Cryptography
biblio
Improving Deep Learning by Incorporating Semi-automatic Moving Object Annotation and Filtering for Vision-based Vehicle Detection*
Submitted by grigby1 on Fri, 07/03/2020 - 1:16pm
Task Analysis
Object segmentation
pubcrawl
resilience
Resiliency
road vehicles
Scalability
security monitoring systems
semiautomatic moving object annotation
semiautomatic moving object annotation method
street intersection surveillance videos
object detection
tools
traffic engineering computing
Training
Vehicle detection
video analytics applications
video frames
video signal processing
video surveillance
vision-based vehicle detection
deep learning you-only-look-once model
automatic foreground object extraction
big image data
computer vision
data augmentation
Data models
dataset construction
deep learning
deep learning models
deep learning neural networks
artifactual data
deep video
feature extraction
human-in-the-loop quick selection
image annotation
image filtering
image motion analysis
learning (artificial intelligence)
Metrics
neural nets
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »