Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Spring Boot Based REST API to Improve Data Quality Report Generation for Big Scientific Data: ARM Data Center Example
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
service-oriented architecture
production-grade Spring applications
pubcrawl
public domain software
resilience
Resiliency
rest
REST service API
Scalability
Servers
popular Spring Boot java-based framework
spring boot
spring boot application
spring configuration
spring model-view-controller framework
Springs
tools
user interfaces
web application technologies
data integrity
application server
arm data center example
atmospheric radiation measurement data center
auto configuration
Big Data
big data security
computer centres
CRUD
CRUD web applications
application program interfaces
data quality report generation
Databases
enterprise applications
internet
Java
java framework
Metrics
natural sciences computing
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
DLR Secure Software Engineering
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
data-science
Automated Secure Software Engineering
static analysis
software engineering
software development process
software automated security evaluation
self-developed software
secure-software-engineering
research organization
Provenance
IT-security
information sources
DLR secure software engineering
security of data
data-oriented approach
code-analysis
Aerospace engineering
Attack vectors
tools
composability
pubcrawl
Resiliency
Software
security
Conferences
biblio
An Open-Source Tool for Automated Power Grid Stress Level Prediction at Balancing Authorities
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Resiliency
pubcrawl
composability
tools
Correlation
automated tool
balancing authority
energy. forecast
grid stress metric
neural network
open-source
power grids
Stress
temperature
Weather forecasting
Automated Response Actions
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network
Submitted by aekwall on Mon, 03/04/2019 - 10:45am
internet
attribution
space-ground integration information network
pattern matching
network attacks
cyber security knowledge graph
cyber attack attribution
Correlation
computer security
tools
security of data
Metrics
graph theory
composability
pubcrawl
Human behavior
cyber-attack
Ontologies
human-in-the-loop security center paradigm
biblio
.Net library for SMS spam detection using machine learning: A cross platform solution
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
short message service
Net library
online detection
pattern classification
pubcrawl
random forest algorithm
random processes
Scalability
security of data
Metrics
SMS
SMS spam detection
spam dataset classification
spam detection
spam filter
spam messages
tools
unsolicited e-mail
detection
classification
Classification algorithms
clustering
Clustering algorithms
cross platform .Net development
C\#
C\# languages
C\# library
Algorithms
electronic messaging
email spam detection
filtering algorithms
Human behavior
learning (artificial intelligence)
Libraries
machine learning
machine learning algorithms
« first
‹ previous
…
46
47
48
49
50
51
52
53
54
…
next ›
last »