Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
use cases
biblio
Quantum Computing for Military Applications
Submitted by aekwall on Fri, 04/01/2022 - 1:06pm
Logic gates
machine learning
military computing
pubcrawl
Resiliency
Compositionality
Predictive Metrics
quantum computing
Computers
annealing
military applications
Quantum mechanics
Qubit
use cases
Scientific Computing Security
biblio
Security Audit of Docker Container Images in Cloud Architecture
Submitted by grigby1 on Tue, 01/25/2022 - 3:54pm
Containers
use cases
Packaging
container security verification
Application Container Security
Automated Secure Software Engineering
Docker
Market research
microservices
tools
maintenance engineering
composability
security audit
NIST
Resiliency
resilience
pubcrawl
Cloud Computing
biblio
Towards Consolidating Industrial Use Cases on a Common Fog Computing Platform
Submitted by grigby1 on Thu, 09/30/2021 - 10:06am
Virtualization
use cases
security
Scalability
resource management
Resiliency
resilience
pubcrawl
multicore computing security
Metrics
Industry 4.0
Fog computing
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning