Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 12:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
biblio
Multimodal, Multiuser Immersive Brainstorming and Scenario Planning for Intelligence Analysis
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
intelligence analysis
tools
Task Analysis
Software
scenario planning advisor
scenario planning
risk assessment
Resiliency
resilience
pubcrawl
privacy
planning (artificial intelligence)
Planning
multiuser Immersive brainstorming
multimodal interaction
Analytical models
immersive systems
immersive environment
IBM
Human Factors
cyber physical systems
composability
collaboration
cognitive immersive systems lab
cognitive immersive software
cognition
CISL
brainstorming tool
brainstorming
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 11:03am
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Using Statistical Methods and Co-Simulation to Evaluate ADS-Equipped Vehicle Trustworthiness
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
safety metrics
NIST
NIST framework
OpenModelica
policy-based governance
pubcrawl
resilience
Resiliency
Ricardo IGNITE
Safety
multiple simulation platforms
security of data
sensors
simulated operational domain design
system reliability
tools
UCEF
vehicle dynamics simulators
virtual analysis functions
virtual reality
cyber-physical systems
composability
Acceleration
ADS-equipped vehicle trustworthiness
ADS-equipped vehicles
application program interfaces
automated driving system-equipped vehicles
co-simulation
complex cyber-physical systems
Computational modeling
trustworthiness
driver information systems
FMI
fractional factorial design
functional mock-up interface
internet
Measurement
middleware
middleware security
biblio
Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
Submitted by grigby1 on Fri, 05/22/2020 - 1:19pm
optimized port scanning
tools
telecommunication traffic
Task Analysis
scanning perimeter
Resiliency
resilience
Reconnaissance
pubcrawl
port scanning
passive scanning
passive information gathering techniques
active reconnaissance phase
nmap tool
network traffic
network accountability
Monitoring
Metrics
Mathematics
internet
footprinting
computer network security
composability
Bandwidth
biblio
Correction of Spaces in Persian Sentences for Tokenization
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
social media services
half-spaces
natural language tasks
normalization
online text
Persian
Persian language
Persian sentences
preprocessing tools
full-spaces
space
textual data
textual preprocessing
user comments
Web 2.0
word identification
word vocabulary
Scalability
exponential growth
automatic analysis
Tokenization
natural language processing
text analysis
Decision Making
tools
internet
standards
social networking (online)
Computational modeling
pubcrawl
Human behavior
Resiliency
Task Analysis
biblio
Extractive Persian Summarizer for News Websites
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
pre-processing
Web sites
tools
textual information
text analysis
statistical methods
statistical
sentence length
Semantics
semantic methods
Scalability
salient sentences
salient features
Resiliency
pubcrawl
automatic extractive text summarization
Persian news articles
natural language processing
Libraries
Human behavior
heuristical and semantical
heuristic methods
genetic algorithms
feature vector
feature extraction
extractive text summarization
extractive Persian summarizer
English words
Data mining
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »