Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Task Analysis
biblio
Deep Learning-Based Image Analysis Framework for Hardware Assurance of Digital Integrated Circuits
Submitted by grigby1 on Fri, 04/09/2021 - 11:22am
learning (artificial intelligence)
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Hardware
Analytical models
Integrated circuit modeling
Scalability
integrated circuits
deep learning
composability
Task Analysis
electronic engineering computing
Artificial Intelligence (AI)
Image analysis
Hardware Assurance
digital IC
digital ICs
digital integrated circuits
DL-based methods
essential analysis steps
hardware information
hardware information examination and verification
Scanning Electron Microscope images
SEM images
semiautomated training data preparation methods
Information Assurance
biblio
Software Assurance of Autonomous Spacecraft Control
Submitted by grigby1 on Fri, 04/09/2021 - 11:21am
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Software
mobile robots
Scalability
composability
software engineering
Task Analysis
aerospace control
Space vehicles
aerospace computing
software engineers
Hazards
software assurance
assurance case style
assurance cases
autonomous control
autonomous spacecraft control
autonomy demonstration experiment
Fault protection
hazard analysis method
in-orbit CubeSat
software documentation
software hazard analysis
software interactions
Information Assurance
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
authorisation
insider threat
Organizations
security
business data processing
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
data privacy
privacy issues
Computational modeling
Attack detection
automata
Metrics
Task Analysis
Silicon
security management
authorized privileges
enterprise automaton
Enterprise process
insider
insider agents
insider attacker
insider threat modeling
nonhuman agents
novel unified model
psycho-social behaviors
biblio
Real-Time Encrypted Traffic Classification via Lightweight Neural Networks
Submitted by aekwall on Thu, 04/08/2021 - 4:36pm
Task Analysis
real-time systems
feature extraction
Resiliency
pubcrawl
Cryptography
Training
deep learning
Compositionality
Hidden Markov models
Information Reuse and Security
1D Convolutional Network
Encrypted traffic classification
Multi-head Attention Mechanism
biblio
Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the Work of Industrial Control Systems.
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
anomalies detection
auto-encoders
autoencoders
classification problems
complex problems
control engineering computing
convolutional neural nets
convolutional neural networks
Decoding
deep learning
ICS Anomaly Detection
industrial control
industrial control system
industrial control systems (ICS)
industrial facilities
Industries
information security
integrated circuits
learning (artificial intelligence)
machine learning
Neurons
process control
process control systems
pubcrawl
resilience
Resiliency
Scalability
Task Analysis
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
auditing storage
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
Data protection
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
models
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
Scalability
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
biblio
Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
Artificial Intelligence
Brain modeling
cognitive privacy
Data models
data privacy
eeg
electroencephalography
expert systems
Human Factors
IoT
neuroscience
Neurotechnology
privacy
psychology
pubcrawl
Scalability
Task Analysis
biblio
Facial Expression Recognition with Convolutional Neural Networks
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
Artificial Intelligence
Artificial Intelligence (AI)
classification
CNN architecture
computer architecture
convolutional neural nets
convolutional neural networks
convolutional neural networks (cnns)
emotion recognition
Face
Face detection
face recognition
Facial Action Coding System (FACS)
facial expression recognition
Facial expression recognition (FER)
facial recognition
feature extraction
Human behavior
illumination correction
image classification
lighting
Metrics
nonverbal communication
pre-processing
pubcrawl
resilience
Resiliency
social communications
Task Analysis
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
Monitoring
IP networks
Task Analysis
Resiliency
genetic algorithms
Sorting
pubcrawl
computer network
Throughput
Compositionality
evolutionary computation
Hash Function
hash algorithms
network flow
Cartesian genetic programming
genetic programming
high-quality network flow hashing
high-speed network systems
Internet Protocol
IPv6 flow hashing
IPv6 network flow hashing
linear genetic programming
multiobjective evolutionary design method
network monitoring probes
nondominated sorting genetic algorithm II
transport protocols
1
2
3
4
5
6
7
8
9
…
next ›
last »