Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
IQS-intelligent querying system using natural language processing
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Databases
Data mining
data warehousing
Generators
Human behavior
MR Generator
natural language processing
NLIDB
pubcrawl
Query Generator
Resiliency
Scalability
Semantic Builder
Semantics
SQL
Structured Query Language
biblio
IntPTI: Automatic integer error repair with proper-type inference
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Computer bugs
fix pattern
integer error
maintenance engineering
pubcrawl
Runtime
Scalability
security
security scalability
Semantics
tools
type inference
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
pubcrawl
Human behavior
Human Factors
composability
CAPTCHA
captchas
distortion
Proposals
Semantics
Speech
Speech recognition
usability
human beings
biblio
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
memory mapping primitive
Web functionality
Web Browser Security
Semantics
security of data
security-critical data
security
script level
Resiliency
rendering (computer graphics)
Reliability
pubcrawl
process memory
process isolation
online front-ends
Metrics
arbitrary script code cross-origin execution
memory disclosure vulnerabilities
isolation policies
Internet Explorer
internet
Human behavior
HTTP cookie leakage
data-only attacks
cross-platform memory cartography framework
control flow hijacking
computer architecture
Chrome
Browser Security
Browsers
backward compatibility
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
software houses
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
Resiliency
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches
ontological modeling approach
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
API
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
biblio
The Arabic Knowledge Graph: Opportunities and Challenges
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
natural language processing
Semantics
Semantic Web
Scalability
Resiliency
question answering (information retrieval)
query answering
pubcrawl
Opportunities
Ontologies
NLP
AKG
Metadata Discovery Problem
Linked Data
internet
graph theory
feature extraction
Encyclopedias
Electronic publishing
Compositionality
challenges
Arabic knowledge graph
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »