Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data science
biblio
Automatic labeling of the elements of a vulnerability report CVE with NLP
Submitted by grigby1 on Fri, 09/01/2023 - 2:49pm
Compositionality
Technological
security knowledge repository
CVE
Information Reuse
BERT
Transformers
data science
distortion
named entity recognition
machine learning
natural language processing
composability
Databases
Software
Resiliency
resilience
pubcrawl
security
biblio
Differential Privacy Techniques for Healthcare Data
Submitted by grigby1 on Fri, 06/30/2023 - 3:47pm
machine learning
pubcrawl
Human behavior
resilience
Resiliency
Scalability
privacy
Medical services
composability
differential privacy
Noise measurement
usability
data science
ata privacy
Healthcareata privacy
HealthcareD
biblio
A timestamp-based covert data transmission method in Industrial Control System
Submitted by grigby1 on Fri, 05/19/2023 - 2:27pm
Compositionality
ICMP
Resiliency
data science
Iptables
covert channels
covert channel
Firewalls (computing)
resilience
security
Linux
Data Security
industrial control system
integrated circuits
industrial control
Protocols
Scalability
pubcrawl
biblio
Research on Network Confrontation Information Security Protection System under Computer Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Computational modeling
network confrontation
policy governance
computer
Resiliency
data science
object detection
computer theory
Compositionality
composability
Adaptation models
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
Training
deep learning
biblio
NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition
Submitted by aekwall on Fri, 03/31/2023 - 9:36am
Neural networks
deep learning
pubcrawl
Metrics
Resiliency
composability
Black Box Attacks
black-box attack
adversarial examples
Design methodology
Cyberspace
data science
Target recognition
transferability
speaker recognition
biblio
The final security problem in IOT: Don’t count on the canary!
Submitted by aekwall on Fri, 02/17/2023 - 10:40am
encoding
CFI
buffer overflow
rop attacks
ROP
data science
Cyberspace
programming
Layout
Software
composability
Resiliency
Scalability
pubcrawl
Anomaly Detection
Resists
Human Factors
biblio
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations
Submitted by grigby1 on Fri, 02/03/2023 - 5:19pm
Economics
Platform virtualization
Interdisciplinarity
high-performance computing
Pervasive Computing Security
Human Factors
social sciences
data science
information science
Internet of Things
Supercomputers
Scalability
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Multiple layered Security using combination of Cryptography with Rotational, Flipping Steganography and Message Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
HMAC
Rotational LSB Steganography
Histogram Comparative Analysis
Flipping LSB Steganography
steganography detection
codes
data science
Steganography
Image coding
encryption
Histograms
encoding
composability
Cryptography
privacy
AES
Metrics
pubcrawl
biblio
Research on cloud security construction of power grid in smart era
Submitted by grigby1 on Fri, 01/20/2023 - 5:05pm
Cloud Computing
information security
pubcrawl
resilience
Resiliency
Scalability
Smart Grid
Planning
Smart Grids
Buildings
Metrics
smart grid security
cloud computing security
Computer applications
Risk
data science
biblio
WhatsApp: Cyber Security Risk Management, Governance and Control
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
pubcrawl
whatsapp
Vulnerability
threat
social networking (online)
Security Risk Management
security
Scalability
risks
risk management
Resiliency
Access controls
Mobile Applications
Metrics
Internet telephony
Human Factors
Governance
Freeware
data science
controls
assets
1
2
3
4
5
6
7
8
9
…
next ›
last »