Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
behavior modeling
biblio
Behavior Modeling for Cybersecurity
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
behavior modeling
cyber security incidents
Cybersecurity
faulty code
Human behavior
human behaviors
human behaviour modeling
Human Factors
Personnel
pubcrawl
scanning devices
security
security of data
soft factors
software developers
system administrators
biblio
Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
sonar transmitter
radio transmitters
received signal
resilience
Resiliency
secure communication
Sonar
Sonar equipment
sonar signal processing
radio frequency fingerprint
specific emitter identification
specific emitter recognition
UASN
underwater acoustic communication
underwater acoustic sensor networks
Underwater vehicles
wireless sensor networks
Acoustic Fingerprints
pubcrawl
power spectrum features
power amplifier
nonlinear model
memory polynomial model
low-frequency radiation source
individual recognition
Human behavior
fingerprint features
feature extraction
Computational modeling
composability
Class D power amplifier
behavior modeling
Analytical models
forum
Call for Papers: Elsevier Computer Networks, Special Issue on 5G-Enabled Internet of Things, Applications and Services
Submitted by willirn1 on Fri, 06/28/2019 - 2:54pm
Call for Papers
Special Issue on 5G-Enabled Internet of Things, Applications and Services
Elsevier Computer Networks
Calls for Papers
Architectures
Modeling
Foundations
security
privacy
design
Architectures
smart objects
5G
Internet of Things (IoT)
behavior modeling
Announcement
biblio
Behavior-Based Community Detection: Application to Host Assessment In Enterprise Information Networks
Submitted by grigby1 on Mon, 06/10/2019 - 12:58pm
Anomaly Detection
behavior modeling
community detection
Comparative Analysis
enterprise information network
entity embedding
graph theory
host assessment
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency