Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
An Experimental Evaluation of a Cloud-Based Virtual Computer Laboratory Using Openstack
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Policy-Governed Secure Collaboration
Virtualization
Virtual machining
Virtual machine monitors
Virtual Computer Lab
Servers
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
openstack
Metrics
Human Factors
Human behavior
Experimental Evaluation
computer architecture
Computational modeling
composability
collaboration
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
Achieving Swarm Intelligence with Spiking Neural Oscillators
Submitted by grigby1 on Wed, 12/20/2017 - 8:51pm
Biological neural networks
Biological system modeling
composability
Computational modeling
Firing
Metrics
Neurons
optimization
oscillating behaviors
pubcrawl
Resiliency
Silicon
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker
biblio
A simple method for anonymous tag cardinality estimation in RFID systems with false detection
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Computational modeling
computer science
estimation
Human behavior
Human Factors
privacy
Protocols
pubcrawl
radiofrequency identification
Resiliency
RFID
RFIDs
biblio
Using synthetic data to train neural networks is model-based reasoning
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Captcha-breaking architecture
human beings
wikipedia
Training
task-specific posterior uncertainty
synthetic-data generative model
synthetic training data
proposal distribution generator learning
Neural networks
neural network training
neural network parameter optimization
neural network generalization
model-based reasoning
Facebook
Computational modeling
pubcrawl
Bayesian model-based reasoning
approximate inference
captchas
CAPTCHA
neural nets
Generators
social networking (online)
Web sites
Training data
learning (artificial intelligence)
Data models
composability
Human Factors
Human behavior
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
software houses
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
Resiliency
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches
ontological modeling approach
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
API
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
« first
‹ previous
…
62
63
64
65
66
67
68
69
70
…
next ›
last »