Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
information system security protection capability
uncertainty
specification description
Security Policies Analysis
security of data
security
requirement analysis
pubcrawl
protective equipment
protection policy
policy-based governance
Information systems
information system structure model
Analytical models
Granular Computing theory
granular computing
Formal Specification
exploratory evaluation requirements
exploratory evaluation process
exploratory evaluation description problem
exploratory evaluation
descriptive specification
description specification
Computational modeling
collaboration
Business
biblio
SuperMan: A Novel System for Storing and Retrieving Scientific-Simulation Provenance for Efficient Job Executions on Computing Clusters
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Metrics
SuperMan
storage management
SimUlation ProvEnance Recycling MANager
simulation
scientific-simulation provenance storage
scientific-simulation provenance retrieval
scientific information systems
scientific computing
Resiliency
Recycling
pubcrawl
Provenance
PROV
open systems
composability
job executions
interoperability
information retrieval
Human Factors
Human behavior
HPC
EDISON
digital simulation
Data models
Conferences
computing clusters
compute-intensive simulations
Computational modeling
Compositionality
biblio
Data Provenance for Multi-Agent Models
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
distributed parallel computing
Resiliency
pubcrawl
Provenance
multi-agent systems
Metrics
Mathematical model
Human Factors
Human behavior
Adaptation models
data provenance
Data models
Computational modeling
Compositionality
composability
Biological system modeling
agent-based systems
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Intrusion Detection
Training
RNN infrastructure
resource exhaustion attack detection
Resiliency
replicator neural network infrastructure
pubcrawl
policy-based governance
Policy
Neural networks
neural nets
network profiling technique
learning (artificial intelligence)
anomaly-based intrusion detection
internet
Government
Governance
flow-based anomaly intrusion detection analysis
feature extraction
Entropy
deep learning technique
computer network security
Computational modeling
collaboration
Artificial Neural Networks
artificial neural network
« first
‹ previous
…
63
64
65
66
67
68
69
70
71
…
next ›
last »