Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tagging
biblio
Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model
Submitted by aekwall on Tue, 04/19/2022 - 11:20am
security
Computational modeling
Resiliency
composability
Payloads
Phishing
pubcrawl
SQL injection
cyber attack
MLP
parsing
SQLIA
Structured Query Language
Tagged Patterns
tagging
Cross Layer Security
biblio
Cyber Warfare Threat Categorization on CPS by Dark Web Terrorist
Submitted by grigby1 on Tue, 04/12/2022 - 12:12pm
Training
machine learning
pubcrawl
Human behavior
Web pages
tagging
Weapons
dark web
Tor
Terrorism
supervised learning
categorization
cyber warfare
Cyber-Physical Systems (CPS)
biblio
Trustworthy Computing on Untrustworthy and Trojan-Infected on-Chip Interconnects
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Metrics
tagging
system-on-chip
Software
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Trustworthy Systems
IP networks
Hardware Trust
Hardware Security
Hardware
Focusing
Europe
design for security
composability
biblio
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Submitted by grigby1 on Wed, 02/09/2022 - 2:47pm
tagging
Stakeholders
security
Resiliency
resilience
pubcrawl
Protocols
proof-of-stake
privacy
Metrics
Human behavior
delays
composability
blockchains
anonymity
biblio
Design of High-frequency RFID based Real-Time Bus Tracking System
Submitted by grigby1 on Fri, 02/04/2022 - 2:50pm
RFID
RFIDs
UHF-RFID
Internet on Things
Bus-monitoring
Blynk cloud
human behaviors
video surveillance
NodeMCU
FRR
FAR
Cloud Computing
radio frequency identification
tagging
Receivers
real-time systems
smart phones
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Classification Between Machine Translated Text and Original Text By Part Of Speech Tagging Representation
Submitted by grigby1 on Mon, 11/29/2021 - 3:32pm
pubcrawl
Zipf’s Law
word embedding
Vocabulary
trigram representation
Training data
text analytics
tagging
Scalability
Artificial Neural Networks
part of speech tagging
Numerical models
Metrics
Indexes
Human Factors
Human behavior
Dictionaries
composability
biblio
Natural Language Processing Based Part of Speech Tagger using Hidden Markov Model
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Hidden markov-model
Viterbi algorithm
tagged sentences
supervised learning
stochastic taggers
rule based taggers
POS tagging
part-of-speech tagging
part of speech tagger
natural language processing applications
Malayalam language
Indian languages
Scalability
hidden Markov model
Hidden Markov models
language translation
tagging
natural language processing
Stochastic processes
Computational modeling
pubcrawl
Human behavior
Resiliency
Conferences
biblio
Inflectional Review of Deep Learning on Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
natural language processing
Time Delay Neural Networks
text analysis
Task Analysis
tagging
Semantics
Scalability
Resiliency
recurrent neural network
recurrent neural nets
pubcrawl
processing layers
nonlinear process
NLP tools
NLP process
-Deep Learning
Multitask Learning
MultiLayer Neural Network
learning (artificial intelligence)
Human behavior
DL methods
Deep nural Network
deep learning
convolution neural networks
contemporary time NLP
Considering Deep
Artificial Neural Networks
artificial neural network
(DL) method
biblio
Special Session: Countering IP Security Threats in Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Monitoring
Valves
Trojan insertion
Training
telecommunication security
tagging
supply chain security
supply chain management
Supply Chain
Scalability
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
Data models
machine learning
logic locking schemes
logic design
learning-based trust verification
learning (artificial intelligence)
IP security threats
invasive software
internet
integrated circuits
integrated circuit technology
integrated circuit manufacture
integrated circuit fabrication
integrated circuit design
Human behavior
electronic engineering computing
biblio
Big Provenance Stream Processing for Data Intensive Computations
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
Data Lake
tagging
stream processing
Sparks
provenance events
Partitioning algorithms
parallel stream
parallel algorithms
parallel algorithm
out-of-order provenance streams
Out of order
on-the-fly provenance processing
Lakes
data-parallel frameworks
data provenance
Big Data
data intensive computations
Business
big provenance stream processing
Big Provenance
Provenance
data analysis
Metrics
Twitter
composability
pubcrawl
Human behavior
Resiliency
data integrity
1
2
next ›
last »