Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
search engines
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
automatic detection
BGS
bitcoin
bitcoin addresses
bitcoin generator scam
bitcoin-based scam monitoring systems
blockchain
blockchain analysis
Computer crime
Crawlers
cryptocurrencies
cryptocurrency
Cryptography
cyberattack
Data mining
financial data processing
fraud detection
free bitcoins
Generators
generic system
Human behavior
internet
pubcrawl
Scalability
scam analysis
scam instances
search engines
security
USD
Web page
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
zero trust
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
data center network
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
network microsegmentation
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
security idea
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
analysis
Computer crime
crime information visual system
crime management
crime monitoring
Crime Trace
Cryptography
dark web
data visualisation
Data visualization
Databases
deep web
deep Web visualization
drugs
Google
Human behavior
Human Factors
internet
Java
pubcrawl
search engines
security
Tors encryption client
unknown dark channels
visualization
biblio
Search Prevention with Captcha Against Web Indexing: A Proof of Concept
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
security of data
security
pubcrawl
Human behavior
internet
composability
search engines
Web pages
Google
information retrieval
indexing
captchas
CAPTCHA
captcha version
containing sensitive words
Crawlers
Google search engine
malicious web crawlers
search engine
search engine bot
search engine database
search prevention
search prevention algorithm
Web crawler
web index
web indexing
web-based captcha conversion tool
webpages
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security of data
security
Protocols
game theory
Resiliency
pubcrawl
composability
graph theory
internet
risk management
risk assessment
communication protocols
probability
risk analysis
industrial control
search engines
Predictive Metrics
Nash Equilibrium
attack graph
attack graphs
asset threat list
Attack Path
attack rule base
attribute attack graph
game-attack graph-based risk assessment model
industrial internet system
nondestructive asset profiling
open services
scan components
search engine keyword segment matching method
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
security of data
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
text analysis
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
supervised learning
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
health domain Web pages
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
Cloud Computing
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
obfuscation
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
big data privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
New Paradigms for Privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
biblio
BlackWidow: Monitoring the Dark Web for Cyber Security Information
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
BlackWidow
cyber criminals
cyber intelligence
cyber security domain
cyber security information
cyber security intelligence purposes
cybersecurity-related topics
dark web
Dark Web analysis
Dark Web services
Docker-based microservice architecture
fraud
Human behavior
Human Factors
illegal services
information collection
information gathering
interactive visual exploration
invasive software
knowledge graph
learning (artificial intelligence)
login information
multiple dark Web
open source intelligence
pubcrawl
search engines
security analyst users
web services
biblio
Deep Packet Inspection Through Virtual Platforms using System-On-Chip FPGAs
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
computer architecture
CPU-DMA based architecture
deep packet inspection
ESL
field programmable gate arrays
Hardware
hardware accelerators
hardware-IP based architecture
hybrid CPU/FPGA
Inspection
logic design
Mentor Vista
pubcrawl
resilience
Resiliency
Scalability
search engines
Software
system on chip
system-on-chip
system-on-chip FPGA
time-domain analysis
time-varying systems
TLM
transaction level modeling
virtual platform
virtual platforms
1
2
3
next ›
last »