Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Profiling of automobile drivers using car games
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
driving log generation
vehicle data
User profiling
traffic engineering computing
Simulator
pubcrawl170115
Part profiles
keystroke identification
Gears
gaming
Games
Acceleration
driving characteristics
digital simulation
Computers
computer games
Computational modeling
car games
biometrics
behavioral patterns
automobiles
automobile driver profiling
biblio
Classifying Text-Based Computer Interactions for Health Monitoring
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
pervasive computing
healthcare provider
human computer interaction
Human-computer interaction
keystroke analysis
Monitoring
patient monitoring
pattern classification
personal health informatics
Healthcare
Pragmatics
Predictive models
PreMCI
premild cognitive impairment
pubcrawl170115
text analysis
unobtrusive method
aging
health monitoring
health care
Dementia
Data models
current assessment
continuous monitoring
constructed statistical model
computer interaction pattern
Computational modeling
cognitive impairment
cognitive function
classifying text-based computer interaction
classification rate
AUC
area under curve
biblio
Cloud supply chain resilience
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
information and communication technologies
supply chains
supply chain theory
supply chain resilience concept
supply chain management
resilience
pubcrawl170112
outsourcing benefits
organisational resilience (OR)
organisational resilience
Cloud Computing
ICT services supply chain
ICT operational resilience
coordination mechanisms
Context
Computational modeling
cloud supply chain resilience
cloud supply chain (CSC) resilience
cloud computing environments (CCE)
biblio
A new mesh simplification algorithm based on quadric error metric
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
Measurement
vertices geometric information
triangular mesh
solid modelling
real-time interactive problem
quadric error metric
pubcrawl170111
mesh simplification algorithm
mesh simplification
3D image processing
Image Processing
Image edge detection
equilateral triangles
Computer graphics
Computational modeling
computational geometry
Approximation algorithms
Algorithm design and analysis
biblio
Volumetric Bias in Segmentation and Reconstruction: Secrets and Solutions
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
optimisation
volumetric bias
standards
standard likelihood term
segmentation method
reconstruction method
pubcrawl170110
probability
Probabilistic logic
probabilistic K-means energy
Optimization methods
binary optimization technique
multilabel optimization technique
ML model estimates
maximum likelihood estimation
KL divergence
image segmentation
Image reconstruction
Entropy
computer vision
Computational modeling
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
« first
‹ previous
…
64
65
66
67
68
69
70
71
72
…
next ›
last »