Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Input variables
biblio
Empirical Research on Multifactor Quantitative Stock Selection Strategy Based on Machine Learning
Submitted by grigby1 on Wed, 09/20/2023 - 1:07pm
composability
random forest regression
quantitative investment
multifactor analysis
gradient lifting regression
linear regression
Fitting
Pattern recognition
Input variables
machine learning
privacy
Resiliency
resilience
pubcrawl
Support vector machines
Forestry
machine learning algorithms
biblio
Design and Analysis of Hash Algorithm Using Autonomous Initial Value Proposed Secure Hash Algorithm64
Submitted by grigby1 on Thu, 06/09/2022 - 1:39pm
pubcrawl
resilience
Cryptography
Memory management
complexity
Compositionality
Input variables
Hash functions
hash algorithms
smart cards
Focusing
SHA
Resiliency
codes
One-way Function
passwords
biblio
Multidimensional Reconstruction-Based Contribution for Multiple Faults Isolation with k-Nearest Neighbor Strategy
Submitted by aekwall on Tue, 03/08/2022 - 1:38pm
principal component analysis
PCA
multiple fault diagnosis
Multi-dimensional reconstruction based contribution
Input variables
Contribution based on k nearest neighbors
fault diagnosis
Correlation
process control
Pollution
cyber-physical systems
Resiliency
Metrics
pubcrawl
Human Factors
Benchmark testing
biblio
Modeling the Structures of Threats to Information Security Risks based on a Fuzzy Approach
Submitted by grigby1 on Mon, 03/29/2021 - 12:29pm
resilience
threat
synthesis
structure
security
Scalability
risk management
Risk
Resiliency
Aggregates
pubcrawl
Probabilistic logic
Linguistics
Input variables
information security
Human behavior
fuzzy conclusion
expert systems
biblio
Assessing and extracting software security vulnerabilities in SOFL formal specifications
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
pubcrawl
software security vulnerabilities
software requirement specifications
software development life cycle
Software
SOFL formal specifications
SOFL
Security Vulnerability Extraction
security of data
secure software product
secure distributed systems
Resiliency
resilience
Requirement Specifications
composability
password
object-oriented languages
object oriented security
Natural languages
Metrics
Input variables
highly interconnected world
formal verification
formal specifications
Formal Specification
formal languages
Formal Language
Computer bugs
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases