Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data structures
biblio
Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
intrinsic content security
content communication
content naming
Content Replacement
content store data structure
Content Store Management
in-network caching
infotainment-rich commute experience
infrastructure network elements
cache replacement mechanisms
multimetric cache replacement policies
multimetric CS management mechanism
NDN-driven VANET
Vehicular Named Data Network
vehicular networks
vehicular social networks
VNDN communications
Named Data Network Security
social networking (online)
security
Resiliency
Human behavior
pubcrawl
Roads
vehicular ad hoc networks
simulation
Social network services
Scalability
internet
data structures
Measurement
computer networks
named data networking
cache storage
Intelligent Transportation System
Intelligent Transportation Systems
biblio
Hash Code Indexing in Cross-Modal Retrieval
Submitted by grigby1 on Fri, 05/22/2020 - 2:34pm
Hamming distance computation
Two dimensional displays
search problems
pubcrawl
neural network training
nearest neighbour methods
nearest neighbor search
multimedia retrieval
multimedia databases
Metrics
Measurement
inverted indexing
indexing
index code representation
hash code indexing
Artificial Neural Networks
Hamming distance
Hamming codes
database indexing
data structures
data representations
cross-modal retrieval
cross-modal hashing algorithms
cross-modal hashing
content-based retrieval
binary hash codes
Binary codes
binary code representation
Benchmark testing
biblio
Associative Data Model in Search for Nearest Neighbors and Similar Patterns
Submitted by grigby1 on Fri, 05/22/2020 - 2:30pm
classification
similarity
self-organize data
Sebestyen measure
nearest neighbor search
Knowledge representation
computational intelligence
associative structures
associative neural network graphs
associative data structures
associative data model
KNN
biology
learning (artificial intelligence)
graph theory
Acceleration
nearest neighbour methods
Measurement
Metrics
neural nets
Classification algorithms
data structures
Data models
pubcrawl
Training
search problems
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public keys
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
central trusted parties
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models
internet
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
Monitoring
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
PATIP-TREE: An Efficient Method to Look up the Network Address Attribution Information
Submitted by aekwall on Mon, 03/04/2019 - 10:45am
IP address attribution information lookup
attribution
traffic engineering
telecommunication network routing
real-time IP address attribution information lookup
Patricia Trie
PATIP-TREE
network traffic engineering
network traffic analysis system
network routing information
named data networking address
IPv6 address
IPv4 address
IP information lookup
human-in-the-loop security center paradigm
Internet Content Provider information
data structures
custom IP address attribution lookup
internet
Databases
Metrics
composability
pubcrawl
Human behavior
real-time systems
security
telecommunication traffic
IP networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »