Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
End-To-End Security Architecture for Federated Cloud and IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
network federation mechanisms
virtualisation
Software Architecture
smart Internet of Things
SFC
service function chaining
sensors
security policy enforcement
security of data
security
Resiliency
resilience
pubcrawl
NFV
network slices protection
network function virtualisation
actuator security
Metrics
IoT networks
Internet of Things
Human behavior
heterogeneous platforms
end-to-end security architecture
Data protection
Data Analytics
data analysis
computer architecture
composability
Communication networks
clouds
cloud networks
Cloud Computing
biblio
Language Dependent Challenge-Based Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
pubcrawl
Metrics
native language backgrounds
native language speakers
native Telugu speakers
natural language processing
nonnative impostor users
Password authentication
Pressing
message authentication
rhythm
Slovak words
Spanish words
typing behaviour
typing rhythm
unobtrusive method
word processing
Writing
foreign language
authorisation
challenge-based KD system
common English words
data analysis
Databases
English challenge-based system
feature extraction
FMR
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamic system
language dependent challenge-based keystroke dynamics
language dependent words
Measurement
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Scalability
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
human factor
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
data analysis
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
bitcoin
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
A Big Data Framework for Intrusion Detection in Smart Grids Using Apache Spark
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
pattern classification
Voltage measurement
synchrophasor dataset classification
Support vector machines
smart power grids
Smart Grids
Smart Grid
self-healing system
security of data
Scalability
Resiliency
pubcrawl
Power industry
power engineering computing
Phasor Measurement Unit
phasor measurement
apache spark
Metrics
machine learning techniques
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Feature Selection
feature extraction
Electricity supply industry
dimensionality reduction algorithm
Data mining
data analysis
big data security metrics
big data framework
Big Data Analytics
Big Data
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »