Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Adaptation models
biblio
CAVELIER: Automated Security Evaluation for Connected Autonomous Vehicle Applications
Submitted by grigby1 on Fri, 03/17/2023 - 10:21am
Adaptation models
security
pubcrawl
resilience
Resiliency
autonomous vehicles
Transportation
sustainable development
road safety
biblio
Phishing Detection and Prevention using Chrome Extension
Submitted by grigby1 on Fri, 02/03/2023 - 5:23pm
Adaptation models
machine learning
machine learning algorithms
Support vector machines
pubcrawl
Human behavior
web services
Phishing
support vector machine
supervised learning
Chrome Extension
URL-based features
biblio
Predicting Confidentiality, Integrity, and Availability from SQL Injection Payload
Submitted by grigby1 on Fri, 02/03/2023 - 3:49pm
confidentiality
SQL injection detection
security information and event management
SIEM
Availability
support vector machine
SQL injection
Firewalls (computing)
integrity
Detectors
Training data
Adaptation models
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Support vector machines
deep learning
biblio
Connected and Autonomous Vehicles against a Malware Spread : A Stochastic Modeling Approach
Submitted by aekwall on Thu, 02/02/2023 - 5:42pm
security
visualization
pubcrawl
Scalability
Resiliency
malware
Transportation
Stochastic processes
Adaptation models
connected vehicles
Autonomous and Connected Vehicle
CAV
Compartmental model
Intelligent Transportation Systems
stochastic model
Stochastic Computing Security
biblio
IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning
Submitted by grigby1 on Fri, 01/13/2023 - 1:28pm
Adaptation models
feature extraction
machine learning
machine learning algorithms
IoT
pubcrawl
resilience
Resiliency
Scalability
Protocols
network security
DDoS
Decision Tree
denial-of-service attack
Security Heuristics
Heuristics
biblio
A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs
Submitted by grigby1 on Fri, 01/06/2023 - 4:25pm
neural network
Pareto optimization
Multi-Objective BLPP
AI/ML Security
Toxicology
adaptive filters
Learning systems
AI Poisoning
Adversarial Machine Learning
Adaptation models
resilience
Perturbation methods
programming
Scalability
optimization
Resiliency
Human behavior
pubcrawl
biblio
PPIoV: A Privacy Preserving-Based Framework for IoV- Fog Environment Using Federated Learning and Blockchain
Submitted by grigby1 on Fri, 01/06/2023 - 4:12pm
Computational modeling
Internet-of-Vehicles (IoV)
federated learning (FL)
privacy preservation
Human Factors
Collaborative Work
AI
Fog computing
Training data
Adaptation models
data privacy
privacy
Scalability
Resiliency
resilience
pubcrawl
blockchain
Training
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
composability
transferability
substitute model
adversarial example
adversarial attack
White Box Security
Adaptation models
black-box attack
machine learning
Computational modeling
Resiliency
Metrics
pubcrawl
Conferences
face recognition
estimation
feature extraction
deep learning
biblio
Detecting and Mitigating Jamming Attacks in IoT Networks Using Self-Adaptation
Submitted by grigby1 on Fri, 12/09/2022 - 6:18pm
computer architecture
Internet of Things
Adaptation models
Monitoring
IoT
pubcrawl
resilience
Resiliency
composability
wireless networks
distributed computing
Jamming
jamming attacks
Autonomic Security
Self-Adaptation
biblio
Towards a Framework for Adapting Machine Learning Components
Submitted by grigby1 on Fri, 12/09/2022 - 6:17pm
Adaptation models
Predictive models
machine learning
pubcrawl
resilience
Resiliency
Computational modeling
composability
cognition
Probabilistic logic
maximum likelihood estimation
Autonomic Security
fraud detection system
model retrain
Self-Adaptation
1
2
3
4
5
6
7
8
9
…
next ›
last »