Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Digital forensic framework using feedback and case history keeper
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Digital Forensics
system monitoring
pubcrawl170109
Mathematical model
history lookup facility
History
forensic models
feedback
Evidence
Adaptation models
digital forensic framework
digital crime investigation
digital crime
cyber crime investigation
Computers
Computer crime
Computational modeling
case history keeper
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
"A Logic of Programs with Interface-Confined Code"
Submitted by grigby1 on Thu, 02/23/2017 - 1:27pm
safety properties
Web browsers
untrusted code
trusted computing system
Trusted Computing
System M program logic
step-indexed model
standards
source code (software)
Semantics
security-critical systems
sandbox
adversary-supplied code
Safety
Radiation detectors
pubcrawl170106
program logic
Memoir design
interface-confined code
interface confinement
Instruction sets
hypervisors
Computational modeling
cognition
biblio
"Cross-Device Consumer Identification"
Submitted by grigby1 on Thu, 02/23/2017 - 11:58am
gradient boosting decision trees
Xgboost
Training
random forest algorithm
Random Forest
pubcrawl170105
Predictive models
personal information
performance evaluation
learning (artificial intelligence)
IP networks
internet
ICDM2015 contest
advertising companies
GBM
GBDT
Ensemble
deep learning
Decision trees
Data models
cross-device consumer identification
consumer identity
consumer behaviour
Computers
Computational modeling
advertising data processing
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 11:56am
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 11:49am
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 11:47am
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 11:41am
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 11:37am
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
« first
‹ previous
…
65
66
67
68
69
70
71
72
73
next ›
last »