Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 2:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 5:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
WIDIP: Wireless distributed IPS for DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
IP networks
Wireless communication
wireless
tools
Servers
Resiliency
pubcrawl
Metrics
IPS
Communication system security
IDS
Human behavior
DoS
DDoS Attack Prevention
DDoS
Computer crime
composability
biblio
The distributed denial of service attacks (DDoS) prevention mechanisms on application layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
Http Post
tools
Slowloris
Servers
RUDY
Resiliency
pubcrawl
Metrics
IP networks
Human behavior
App-Ddos attacks
Http Get
Floods
Filtering
DNS
DDoS Attack Prevention
Computer crime
composability
Bandwidth
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 11:19am
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
biblio
IntPTI: Automatic integer error repair with proper-type inference
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
Computer bugs
fix pattern
integer error
maintenance engineering
pubcrawl
Runtime
Scalability
security
security scalability
Semantics
tools
type inference
biblio
Towards a software vulnerability prediction model using traceable code patterns and software metrics
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
Metrics
Predictive Metrics
Predictive models
predictive security metrics
pubcrawl
security
Software
software metrics
testing
tools
biblio
Model-Based Attack Tolerance
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
message authentication
tools
software-based systems
Robustness
Resiliency
pubcrawl
monitoring method
Monitoring
model-based testing
model-based attack tolerance
Adaptation models
intrusion tolerance
internet
generic approach
formal verification
formal method
composability
authentication Web application
authentication
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
next ›
last »