Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Context modeling
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by
Katie Dey
on Mon, 09/09/2019 - 1:14pm
C3E 2019
Communication networks
Computational modeling
computer network security
Context
Context modeling
cyber situation awareness
Cyberspace
Dagger framework
Data models
data visualisation
Data visualization
decision-making
HMT
Human Machine Teaming
Interactions
Knowledge representation
mission impact assessment
mission impact situation awareness
modeling
modeling framework
network security
network security data context
security
visualization
visualization framework
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by
grigby1
on Mon, 01/21/2019 - 11:39am
Adversary Models
Computational modeling
Context modeling
Data models
Hardware
Hardware Security
Human behavior
inference
machine learning
memory probing
Metrics
model exfiltration
model theft
neural network
Neural networks
pubcrawl
Resiliency
Scalability
Side-Channels
Training
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by
grigby1
on Mon, 12/10/2018 - 10:38am
authoring languages
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
drive-by-download attacks
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
machine learning
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
pubcrawl
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
biblio
Multi-Level Security for the 5G/IoT Ubiquitous Network
Submitted by
grigby1
on Tue, 02/06/2018 - 12:54pm
5G
5G mobile communication
5G-IoT ubiquitous network
Access Control
BLP
Computational modeling
computer network security
Context
Context modeling
fifth-generation mobile communication networks
Human behavior
Human Factors
information security domain
Internet of Things
IoT
Metrics
Multi-Level Security
multilevel security model
network bandwidth
network domain
pubcrawl
Resiliency
Scalability
security model
Temperature measurement
Transaction Data
Ubiquitous Computing Security
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by
grigby1
on Fri, 02/02/2018 - 12:27pm
certification
compliance assurance
composability
Context modeling
cyber-physical systems
documentation
formal verification
integrated computational-physical capabilities
pubcrawl
requirements engineering
Safety
safety assurance
Safety management
safety requirements
safety-critical software
Safety-Critical Systems
Scalability
security
Security Assurance
security management
security of data
security requirements
security-critical systems
software assurance
standards
Unified modeling language
biblio
Enhanced word embedding with multiple prototypes
Submitted by
K_Hooper
on Wed, 01/10/2018 - 10:14am
Artificial Neural Networks
basic word repressentation methods
Biological system modeling
Computational modeling
Context modeling
dense real-valued vector space
distributed word representation
enhanced word embedding
Human behavior
language models
MCBOW
multiple prototypes
natural language processing
NLP
Prototypes
pubcrawl
Resiliency
Scalability
similar context
similar meanings
vector space
word embedding
word embeddings learning
word representation
word similarity evaluation task
word unit
biblio
Lightweight Provenance Service for High-Performance Computing
Submitted by
grigby1
on Tue, 12/12/2017 - 12:27pm
composability
Compositionality
Context modeling
data management
Data models
high-performance computing
History
Human behavior
Human Factors
Instruments
Kernel
Lightweight
Metrics
Provenance
pubcrawl
Resiliency
rich metadata
usability
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by
grigby1
on Tue, 12/12/2017 - 12:19pm
Aggregates
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
distributed word representation learning
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
large-scale English cQA data sets
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
question answering (information retrieval)
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by
grigby1
on Mon, 11/20/2017 - 11:25am
Access Control
Adaptation models
Computational modeling
Context
collaboration
Context modeling
context-aware computing
Context-aware security
context-aware security policy management
Governance
Government
mathematical optimization
Mobile handsets
Policy
policy-based governance
proactive security
pubcrawl
reactionary security
security economics
security of data
security policies
security policy planning
stochastic programming
stochastic programming models
ubiquitous computing
biblio
Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model
Submitted by
grigby1
on Wed, 03/29/2017 - 11:33am
Anomaly Detection
artificial neural network model
Context
Context modeling
contextual anomaly detection method
cyber-physical security
cyber-physical systems
cyberphysical security
data analysis
Data models
Density estimation robust algorithm
distributed energy resource behaviour
energy resources
intrusion detection system
low voltage distribution grid
malicious voltage control actions
Metrics
neural nets
neural network
Neural networks
neural networks security
photovoltaic rooftop power plant data
policy-based governance
power system security
power system stability
Production
pubcrawl
Resiliency
security of data
Smart Grid
Smart Grids
smart power grids
Voltage control
voltage distribution
1
2
next ›
last »