Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
Cross-Modal Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
Predictive Metrics
visualization
Visual Re-ranking
style transfer
Semantics
Scalability
Resiliency
resilience
pubcrawl
convolutional neural networks
Pipelines
neural style transfer
Multi-Modal
Metrics
image retrieval
Euclidean distance
Data mining
Cross-Modal
biblio
Incorporating Multiscale Contextual Loss for Image Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:29pm
Metrics
wavelet transforms
wavelet transform
wavelet coefficients
Semantics
semantic information
Scalability
Resiliency
resilience
pubcrawl
Predictive Metrics
optimization framework
optimization
neural style transfer
multiscale contextual loss
content image
lower-level CNN features
image wavelet transform
image style transfer
Image resolution
image representation
image classification
high-level CNN features
Haar transforms
Haar loss
feedforward neural nets
feature extraction
distortion
convolutional neural networks
convolution
biblio
An Incremental Learner for Language-Based Anomaly Detection in XML
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Simple object access protocol
poisoning attack
protocol specifications
Protocols
pubcrawl
pushdown automata
resilience
Resiliency
Scalability
security
Semantics
signature wrapping attack
mixed-content XML
stream validation
visibly pushdown automata
Web Service
web services
Wrapping
XML
XML schema validation
XML types
XML-based protocols
zero false positives
explicit security problems
AI Poisoning
Anomaly Detection
anomaly detector
Apache Axis2
Apache Rampart
automata theory
automaton states
complex language
datatyped XML
dXVPA
Experimental Evaluation
adversarial training data
extensible markup language
grammatical inference
Human behavior
incremental learner
language representation
language-based anomaly detection
learned automaton
learning (artificial intelligence)
learning automata
message formats
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Interoperability and lightweight security for simple IoT devices
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
Ontologies
sensors
Semantics
Semantic Web
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Passive optical networks
open systems
Ontology
ontologies (artificial intelligence)
composability
nonfunctional properties
Microelectronics Security
Metrics
JSON-LD
IoT security
IoT device security properties
IoT device privacy properties
IoT device interoperability
IoT device annotate connectivity properties
IoT device
interoperability
Internet of Things
data privacy
biblio
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages
Submitted by grigby1 on Mon, 06/11/2018 - 3:46pm
collaboration
middleware security
security extension
modelling language
middleware
cyber security requirements
cyber security concepts
Business Process Model and Notation
business process
business data processing
BPMN processes
BPMN
specification languages
policy-based governance
resilience
Policy
Resiliency
Complexity theory
Formal Specification
visualization
Semantics
tools
computer security
security framework
security of data
composability
pubcrawl
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
biblio
Trust Structure in Public Key Infrastructures
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
pubcrawl
Trusted Computing
trust structure
styling
style
Servers
Semantics
security augmentation
Scalability
Resiliency
public key infrastructure
public key cryptography
Public key
authentication
privacy
PKI Trust Models
PKI
Metrics
intelligent algorithms
insert
Human Factors
Human behavior
generic PKI model
formatting
certification
biblio
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security breaches
US Health Insurance Portability and Accountability Act
US Department of Health and Human Services
taxonomy
software engineering
software development
social norms
SEMAVER
Semantics
semantic similarity metric
semantic similarity
semantic reasoning
security policies
security of data
accidental misuses
Security and privacy breaches
security
pubcrawl
Ontologies
norm violation
Medical services
Measurement
malicious misuses
inference mechanisms
HIPAA
HHS
cognition
breach ontology
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »