Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection
biblio
NTIA Releases Minimum Elements for a Software Bill of Materials
Submitted by willirn1 on Fri, 10/22/2021 - 4:30pm
commerce
Cybersecurity
detection
Policy
Prevention
Software
biblio
On the Effectiveness of Application Permissions for Android Ransomware Detection
Submitted by aekwall on Mon, 10/04/2021 - 1:54pm
malware
pattern locks
permissions
dataset
Data mining
applications
android
Accuracy
detection
Ransomware
security
Human behavior
Resiliency
Scalability
pubcrawl
feature extraction
Analytical models
Predictive models
internet
computer science
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Development of an Intrusion Detection System Using a Botnet with the R Statistical Computing System
Submitted by grigby1 on Wed, 09/08/2021 - 9:34am
Intrusion Detection
wide area networks
Resiliency
resilience
r
pubcrawl
Prevention
Metrics
malware
Logic gates
Bot
intrusion
Information services
Human behavior
Electronic publishing
detection
DDoS Attack Prevention
composability
botnet
biblio
Real-time False Data Injection Attack Detection in Connected Vehicle Systems with PDE modeling
Submitted by grigby1 on Wed, 06/30/2021 - 3:22pm
Ghost Vehicle
vehicle dynamics
Resiliency
resilience
pubcrawl
Perturbation methods
partial differential equation
Observers
Mathematical model
Human Factors
Human behavior
Acceleration
false data injection attack
False Data Detection
estimation
detection
Data models
cyber physical systems
connected vehicles
composability
Communication networks
biblio
Cache side-channel attacks detection based on machine learning
Submitted by grigby1 on Thu, 05/13/2021 - 12:23pm
Scalability
Cache side-channel attack
random forests
Attack vectors
detection
Probes
side-channel attacks
Hardware performance counters
privacy
computer architecture
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
Cloud Computing
biblio
Machine Learning based Intrusion Detection System for Web-Based Attacks
Submitted by grigby1 on Tue, 04/27/2021 - 2:38pm
machine learning
Resiliency
composability
privacy
Big Data
detection
feature extraction
Metrics
pubcrawl
resilience
Scalability
security
web-based attacks
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
computer networks
Systems engineering education
SEnSE
insider threats detection
insider threat sense
hierarchy-mapping based insider threats model
Fellows
Electronic equipment
active defense model
Systems engineering and theory
detection
model
computer science education
insider threat
Metrics
computer security
Information systems
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
information security
security of data
biblio
Chinese Character Captcha Sequential Selection System Based on Convolutional Neural Network
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
feature extraction
word processing
word order restoration
word order recovery
Task Analysis
single Chinese character data
security of data
rotation transformation
recognition
pubcrawl
probability
Neural networks
natural language processing
image segmentation
Human behavior
handwritten character recognition
10-layer convolutional neural network
detection
convolutional neural networks
convolutional neural nets
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CNN
Chinese character recognition sub-process
Chinese character detection
Chinese character captcha sequential selection system
Chinese character captcha recognition
Chinese character
character recognition
captchas
CAPTCHA
affine transformation
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »