Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Analysis of network address shuffling as a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:13am
Computational modeling
Computers
Information systems
IP networks
moving target defense
network address remapping
network address shuffling
probabilistic models
probability
Probes
Reconnaissance
security of data
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 10:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
cloud service providers
Web based applications
Servers
security management
Protocols
internet
Diameter-AAA
diameter AAA mechanisms
Computational modeling
cloud system architecture
authentication
Cloud Security
Cloud Computing
cloud based services
cloud based applications
Browsers
Availability
authorization and accounting
authorisation
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 2:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 2:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
biblio
Spatio-temporal semantic enhancements for event model of cyber-physical systems
Submitted by BrandonB on Mon, 05/04/2015 - 2:24pm
embedded systems
Adaptation models
attribution enhancement
basic event model
BEM
CEP engine Esper
complex event process
composition determination
Computational modeling
CPS
CPS event representation
cyber-physical systems
Data models
EIS
spatio-temporal semantic enhancements
event attribution extraction
event modeling
event process functions
event semantic
extended information set
multilevel heterogeneous embedded system
Observers
programming language semantics
semantic adaptor
Semantics
Sensor phenomena and characterization
spatio-temporal attributes
spatio-temporal event
biblio
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
Submitted by BrandonB on Mon, 05/04/2015 - 2:22pm
textual modeling
multiple-author documents
Predictive models
Probabilistic topic models
receiver operating characteristic curve
ROC curve
SAT model
supervised author-topic model
text analysis
meta-data
topic representations
topic-based generative models
Training
unsupervised AT model
Unsupervised Learning
unsupervised learning technique
Vectors
Computational modeling
area under curve
AUC
author-topic model
authorship attribution
authorship learning
authorship prediction
Bayesian inference
Big Data
Analytical models
Data models
dimension reduction
Dirichlet distribution
High dimensional texual data
information discovery
Mathematical model
meta data
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
next ›
last »