Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
About possibilities of applying logical analysis of natural language in computer science
Submitted by aekwall on Mon, 11/02/2020 - 2:30pm
formal representation
transparent intensional logic
semantic machine
programming language semantics
Natural languages
natural language Montague intensional logic
montague intensional logic
logical apparatuses
logical analysis of natural language
logical analysis
Human behavior
formal languages
expressive logical method
computer science
formal logic
Computing Theory and Compositionality
Compositionality
Human Factors
pubcrawl
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:53am
Routing protocols
Location Privacy in Wireless Networks
source location privacy
resource-constrained sensor nodes
location privacy protection
Global Adversary
context privacy
Position measurement
WSN
Compositionality
computer science
Monitoring
network traffic
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
Stateless Security Risk Assessment for Dynamic Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
computer science
Dynamic Networks and Security
unpredictable security postures
stateless security risk assessment
security overview
network states
Graphical security modeling
Emerging Networking Technology
emerging networking technologies
dynamic networks
network configurations
security posture
computer network security
NIST
risk management
Metrics
composability
pubcrawl
Resiliency
software defined networking
security
Conferences
Cloud Computing
biblio
Biometric Security and Performance Metrics: FAR, FER, CER, FRR
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
personal privacy
Iris recognition
FRR
forgotten passwords
Fingers
FER
FAR
CER
biometrics authentication
biometric security system
biometric framework
biometric confirmation framework
access control process
authorisation
biometric
Face
Compositionality
computer science
Fingerprint recognition
biometrics (access control)
computational intelligence
composability
pubcrawl
security
data privacy
Cryptography
biblio
On the Relevance of IT Security in TDL
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Fixed Message Format
VMF security
Variable Message Format
TDL
tactical data links
standard Internet technology
software development patterns
scientific computing
Link 16
Link 11
IT security standards
IT security perspective
security of data
computer science
commercial of the shelf systems
command and control systems
Compositionality
IT security
internet
computational intelligence
composability
pubcrawl
Cryptography
biblio
Formalizing Constructive Cryptography using CryptHOL
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
Theorem Proving
composability
random systems
proof rules
information-theoretically secure channel
game-based proofs
CryptHOL
constructive cryptography
computer-aided cryptography
composable cryptographic security statements
computer aided cryptography
universal composability
complex system
Cryptography
cryptographic proofs
formal methods
verification
formal verification
computer science
Complexity theory
Probabilistic logic
tools
pubcrawl
game theory
encryption
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »