Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compositionality
biblio
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
network topology
level division
layer division
cyberspace security structure
policy governance
Resiliency
computer theory
graph theory
Cyberspace
computational complexity
Compositionality
collaboration
computer security
composability
Topology
Computational modeling
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Network Security Situation Assessment Method Based on Absorbing Markov Chain
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Compositionality
situation assessment
network assets
Absorbing Markov chain
policy governance
Resiliency
computer theory
graph theory
Markov processes
collaboration
network security
composability
Computer crime
resilience
Metrics
Human behavior
pubcrawl
security
biblio
The Design and Realization of Information Security Technology and Computer Quality System Structure
Submitted by grigby1 on Fri, 04/28/2023 - 3:58pm
Routing
research and analysis
information security technology
Design and implementation
computer quality architecture
policy governance
Resiliency
computer theory
Design methodology
computer networks
Compositionality
computer architecture
composability
system-on-chip
Hardware
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
Vehicle Violation Detection System Based on Improved YOLOv5 Algorithm
Submitted by grigby1 on Fri, 04/28/2023 - 3:54pm
Cryptography
security
pubcrawl
Object recognition
composability
Compositionality
computational intelligence
license plate recognition
Quadrilateral Detection
Violation Judgment
YOLOv5
biblio
Quantitative matching method for network traffic features
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Cryptography
security
pubcrawl
telecommunication traffic
composability
Compositionality
computational intelligence
heterogeneous networks
Soft sensors
Matching Method
network traffic
Quantitative Matching
Segment Calculation
Similarity of Features
biblio
Intelligent Penetration and Attack Simulation System Based on Attack Chain
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Task Analysis
penetration simulation system
security assessment
computational intelligence
Penetration Testing
Market research
visualization
vulnerability assessment
Compositionality
Cryptography
network security
Decision Making
composability
Databases
pubcrawl
Artificial Intelligence
security
Predictive models
biblio
Data Security Structure of a Students’ Attendance Register Based on Security Cameras and Blockchain Technology
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Compositionality
security camera
blockchains
mechatronics
Data Security
computational intelligence
Hard disks
blockchain technology
Cameras
Cryptography
Registers
composability
Computer crime
Artificial Intelligence
pubcrawl
Servers
security
biblio
Docscanner: document location and enhancement based on image segmentation
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
security
pubcrawl
Computational modeling
Entropy
composability
Compositionality
computational intelligence
image segmentation
document processing
Document Scanner
semantic segmentation
biblio
Cybers Security Analysis and Measurement Tools Using Machine Learning Approach
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
machine learning
machine learning algorithms
security
pubcrawl
Hardware
internet
composability
Artificial Intelligence
Compositionality
learning (artificial intelligence)
Government
Artificial Intelligence (AI)
computational intelligence
machine learning (ML)
and cyber security
biblio
Research on the technical application of artificial intelligence in network intrusion detection system
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
information security
security
Neural networks
pubcrawl
network security
privacy
Artificial Intelligence
composability
Compositionality
surveillance
information processing
computational intelligence
scientific computing
network intrusion detection
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »