Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
resilience
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
live remote checkpointing
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
controller/host isolation
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
central SDN controller
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
Hidden attractor dynamics of a novel non-equilibrium fractional-order chaotic system and its synchronisation control
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
Policy-Governed Secure Collaboration
non-equilibrium
nonequilibrium FOCS
nonequilibrium fractional-order chaotic system
nonlinear control
nonlinear control systems
numerical analysis
numerical simulation
Orbits
phase portraits
Policy
Metrics
pubcrawl
resilience
Resiliency
Scalability
Sensitivity
synchronisation
synchronisation control
Synchronization
Trajectory
fractal Lyapunov dimension
bifurcation analysis
bifurcation parameter
chaos
chaos based cryptology
coding information
collaboration
composability
Cryptography
cryptology
encoding
bifurcation
fractional-order chaotic system
fractional-order hidden strange attractor
hidden attractor
hidden attractor dynamics
Human behavior
human factor
Lyapunov methods
maximum likelihood estimation
maximum Lyapunov exponent spectrum
biblio
The electromagnetic leakage analysis based on arithmetic operation of FPGA
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
Metrics
SVM
Support vector machines
Scalability
Resiliency
resilience
pubcrawl
Probes
Policy-Governed Secure Collaboration
Policy
Oscilloscopes
arithmetic operation
Kernel
human factor
Human behavior
field programmable gate arrays
energy consumption
Electromagnetics
electromagnetic energy leakage
cryptology
composability
collaboration
biblio
Research of a reconfigurable coarse-grained cryptographic processing unit based on different operation similar structure
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
pubcrawl
logic synthesis
M/DLFSR
Metrics
multiply/divide linear feedback shift register
Policy
Policy-Governed Secure Collaboration
power aware computing
power consumption saving
logic design
Reconfigurable
reconfigurable architectures
reconfigurable coarse-grained cryptographic processing unit
resilience
Resiliency
Scalability
shift registers
size 55.0 nm
Different Operations Similar Structure
Algorithm design and analysis
arrays
Ciphers
coarse-grained reconfigurable cryptologic array
collaboration
composability
Cryptography
cryptology
55nm CMOS standard-cell library
different operations similar structure reconfigurable design
feedback
feedback shift register structure
finite Field GF(2n)
Galois fields
Human behavior
human factor
Linear feedback shift registers
biblio
Alias-free compressed signal digitizing and recording on the basis of Event Timer
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
non-uniform sampling
wideband signal recording
Synchronization
Spectrogram
signal sampling
signal and sinusoid crossings
Scalability
Resiliency
resilience
reference sine wave crossing
pubcrawl
Policy-Governed Secure Collaboration
Policy
picosecond resolution event timing
A033-ET event timer
Metrics
Measurement by laser beam
human factor
Human behavior
Event timing
Distance measurement
data recording
data compression
cryptology
composability
collaboration
analogue-digital conversion
alias free compressed signal digitization
biblio
Developing basic configuration of triangle array antenna for circularly polarized-Synthetic Aperture Radar sensor application
Submitted by grigby1 on Wed, 02/21/2018 - 1:44pm
radar technology
microwave antenna arrays
MoM
patch antenna
Policy
Policy-Governed Secure Collaboration
pubcrawl
radar antennas
radar imaging
microstrip antenna arrays
resilience
Resiliency
Scalability
Substrates
synthetic aperture radar
triangle array antenna
uav
UHF antennas
CP-SAR
antenna feeds
antenna radiation patterns
Circularly Polarized- Synthetic Aperture Radar sensor
circularly polarized-synthetic aperture radar sensor
collaboration
composability
corporate feeding-line
corporate feeding-line design
antenna arrays
cryptology
drone airspace
frequency 1.25 GHz
gain 2.47 dB
Human behavior
human factor
method of moments
Metrics
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »