Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
Delving in the loss landscape to embed robust watermarks into neural networks
Submitted by grigby1 on Fri, 07/29/2022 - 9:45am
Adaptation models
Training
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Redundancy
Artificial Neural Networks
Shape
Watermarking
Sensitivity
pattern locks
biblio
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment
Submitted by grigby1 on Fri, 07/15/2022 - 12:59pm
Human Factors
Training
Scalability
Resiliency
resilience
pubcrawl
pervasive edge computing
Pervasive Computing Security
Neural networks
Metrics
Stochastic Computing Security
Human behavior
Gaussian mechanism
differential privacy
deep learning
Data models
Computational modeling
collaborative deep learning
collaboration
biblio
CyberBERT: A Deep Dynamic-State Session-Based Recommender System for Cyber Threat Recognition
Submitted by grigby1 on Fri, 07/15/2022 - 12:21pm
Training
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Scalability
History
real-time systems
computer security
malware
Aerodynamics
recommender systems
biblio
AI & ML Based Anamoly Detection and Response Using Ember Dataset
Submitted by aekwall on Thu, 07/14/2022 - 4:21pm
Ransomware
Threat Detection &response
security tools
EMBER
Cyber Security Analytics
pubcrawl
Anomaly Detection
Market research
cyber security
security
composability
Resiliency
Metrics
feature extraction
machine learning
tools
Training
biblio
Rapid Ransomware Detection through Side Channel Exploitation
Submitted by aekwall on Thu, 07/14/2022 - 4:21pm
Predictive models
Training
machine learning
machine learning algorithms
encryption
Metrics
Resiliency
composability
Training data
Ransomware
ransomware detection
Sensor Systems
pubcrawl
Physical Sensor
Sensor phenomena and characterization
Side Channel
biblio
A Multi-Layered Defense Approach to Safeguard Against Ransomware
Submitted by aekwall on Thu, 07/14/2022 - 4:20pm
Ransomware
Web Filtering
layered defense
email security
antivirus
Antimalware
DNS
pubcrawl
cyber security
malware
security
composability
Resiliency
Metrics
Conferences
Computer crime
tools
Medical services
Training
biblio
Cyber-Security Training Evaluation Metrics
Submitted by grigby1 on Wed, 07/13/2022 - 1:18pm
Measurement
Training
Scoring
Scalability
Resiliency
resilience
pubcrawl
Proposals
policy governance
Organizations
Metrics
collaboration
Human behavior
Gamification
evaluation
cybersecurity education
Cyber-security training
Cyber-ranges
Conferences
Computer crime
composability
biblio
Unveiling the user requirements of a cyber range for 5G security testing and training
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
Human behavior
Training
Testing Training
Scalability
Resiliency
resilience
pubcrawl
policy governance
Personnel
Metrics
Knowledge engineering
expert systems
cybersecurity education
cyber range
Conferences
Computational modeling
composability
Communications technology
collaboration
5G mobile communication
5G
security
biblio
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
Personnel
Training
Topology
security training
security
Scoring model
Scalability
Resiliency
resilience
pubcrawl
policy governance
collaboration
Organizations
Metrics
Human behavior
Gamification
Federated platforms
cybersecurity education
Cyber-range
Conferences
Computer crime
composability
biblio
Bridging the Gap: Adapting a Security Education Platform to a New Audience
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
engineering education
Training
security
Scalability
Resiliency
resilience
pubcrawl
policy governance
Metrics
Human behavior
active learning
cybersecurity education
cyber security teaching
Current supplies
Conferences
Computer crime
composability
collaboration
capture the flag
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »