Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
Chinese named entity recognition method for the field of network security based on RoBERTa
Submitted by grigby1 on Thu, 10/06/2022 - 3:20pm
resilience
public safety
Network supervision and control
Cellular phones
BiLSTM
RoBERTa
named entity recognition
Resiliency
Text recognition
Named Data Network Security
feature extraction
Semantics
network security
internet
Scalability
Human Factors
Human behavior
pubcrawl
Neural networks
biblio
Investigating the Design Space for Name Confidentiality in Named Data Networking
Submitted by grigby1 on Thu, 10/06/2022 - 3:20pm
privacy
pubcrawl
Human behavior
Human Factors
Scalability
data privacy
named data networking
military communication
confidentiality
Semantics
resilience
Systematics
Named Data Network Security
TCPIP
Resiliency
biblio
Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata
Submitted by grigby1 on Fri, 09/30/2022 - 8:42am
Probabilistic logic
Probabilistic Automata
Network Monitoring
IEC 104
Resiliency
IPFIX
ICS Anomaly Detection
traffic control
Semantics
security
automata
ICs
Protocols
Scalability
Integrated circuit modeling
resilience
pubcrawl
Anomaly Detection
biblio
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network
Submitted by grigby1 on Fri, 09/30/2022 - 8:42am
deep learning
feature extraction
Anomaly Detection
pubcrawl
resilience
Conferences
Scalability
Production
Runtime
Linux
Semantics
Natural languages
ICS Anomaly Detection
Resiliency
Log sequence
Unstructured log
biblio
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware
Submitted by grigby1 on Tue, 09/20/2022 - 2:14pm
malware detection
false trust
hardware root-of-trust
Hardware performance counters
Resiliency
JTAG
rootkit
Semantics
Kernel
pubcrawl
Linux
malware
real-time systems
Scalability
performance evaluation
Hardware
resilience
policy-based governance
biblio
AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Submitted by aekwall on Fri, 08/12/2022 - 4:03pm
Reliability
tools
Resiliency
Human behavior
composability
Semantics
static analysis
pubcrawl
maintenance engineering
Computer bugs
Automated Program Repair
Avatars
fix pattern.
biblio
A Compositional Cost Model for the λ-calculus
Submitted by aekwall on Fri, 08/12/2022 - 3:57pm
Computational modeling
computer science
Games
Semantics
Program processors
Random access memory
pubcrawl
Compositionality
Turing machines
biblio
IoT Cooking Workflows for End-Users: A Comparison Between Behaviour Trees and the DX-MAN Model
Submitted by aekwall on Fri, 08/12/2022 - 3:56pm
visualization
Internet of Things
Semantics
Complexity theory
Computer languages
pubcrawl
Compositionality
Model driven engineering
Behavior Trees
DX-MAN model
End-User Development
biblio
Mining Frequent and Rare Itemsets With Weighted Supports Using Additive Neural Itemset Embedding
Submitted by aekwall on Fri, 08/12/2022 - 3:56pm
Neural networks
Linguistics
Scalability
Databases
Semantics
pubcrawl
Compositionality
Additives
additive compositionality
itemset mining
Itemsets
neural embedding
vector sum problems
weighted support
biblio
On Compositional Information Flow Aware Refinement
Submitted by aekwall on Fri, 08/12/2022 - 3:53pm
confidentiality
composability
verification
Unwinding
specification
ORAM
observation
noninterference
Knowledge
Ignorance
security
multi-agent systems
pubcrawl
Random access memory
Observers
Kernel
computer security
Semantics
simulation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »