Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dogs
biblio
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory
Submitted by aekwall on Thu, 06/24/2021 - 11:49am
Training data
AI Poisoning
Toxicology
show and tell model
poisoning attack
defense
autoencoder
AI
Dogs
Scalability
image recognition
image restoration
Neural networks
pubcrawl
Human behavior
Resiliency
Data models
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
A comparative analysis of channel coding for molecular communication
Submitted by aekwall on Mon, 11/25/2019 - 2:07pm
cyclic codes
single nanomachine
Silicon
nanomachines
Nanoelectromechanical systems
molecular communication via diffusion
molecular communication (telecommunication)
molecular communication
MCvD
electromagnetic waves
Dogs
Task Analysis
communication via diffusion
Bose-Chaudhuri-Hocquenghem codes
BCH codes
Reed-Solomon codes
channel coding
Metrics
composability
pubcrawl
Resiliency
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication
biblio
Object-Specific Style Transfer Based on Feature Map Selection Using CNNs
Submitted by grigby1 on Mon, 11/19/2018 - 12:29pm
Metrics
visualization
style transfer
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
object-specific style transfer
neural style transfer
Neural networks
neural nets
CNN
machine learning
image style
Image Processing
image content
Feature Selection
feature map selection
Dogs
convolutional neural networks
Conferences
computer vision