Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Information Reuse
biblio
EARRING: Efficient Authentication of Outsourced Record Matching
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Cloud Computing
big data security metrics
Big Data Analytics
data integrity
correct record matching results
Big Data
authentication
data management
data privacy
design EARRING
Entity Resolution
Euclidean distance
identifying matching records
information integration
Information Reuse
integrity
Outsourced Database Integrity
outsourced dataset
outsourced record matching framework
outsourcing
outsourcing paradigm
pubcrawl
record matching
Resiliency
security
Servers
specific distance metrics
third-party server
verification object
VO
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Android (operating system)
Android source code
b-bit minwise hashing technique
clone-and-own reuse analysis
Cloning
component extraction
Cryptography
Data mining
Debian GNU package
Debian Linux package
directory names
efficient file similarity computation
file clone detection
Firefox source code
Information Reuse
origin analysis
pubcrawl
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
Software reuse
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
biblio
An Integrated Approach for Resilience in Industrial Control Systems
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Adaptation models
contract-based design
contract-based design paradigm
controller configurations
Design Time
Hardware
hydroelectric power
hydropower plant units
industrial control
industrial control system
Industrial Control Systems
industrial plants
Information Reuse
meta-adaptive system
model-driven engineering
model-driven engineering techniques
Monitoring
pubcrawl
resilience
Resiliency
Run Time
security
self-adaptive software system
Software systems
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Adaptive Programming
Case-Based Reasoning
computer security
drones
Evolutionary Programming
Expectation-Driven Receiver
Grammar
grammatical inference
Hard Real-Time Systems
Information Reuse
Memory management
Production
pubcrawl
real-time systems
Receivers
Resiliency
security
Waveform Analysis and Synthesis
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Active dependency mapping
artificial degradation
Automated Dependency Mapping
computer security
Conferences
Cyber Dependencies
cyber physical systems
cyber-physical systems
Data-driven approach
Degradation
dependency analysis
dependency relations
distributed processing
distributed systems
Ecosystems
enterprise networks
Information Reuse
interrelated software services
Mission Assurance
network environment
network performance
pubcrawl
quantitative assessment
resilience
Resilience and Robustness
Resiliency
Robustness
security
Software
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
ABAC
Access Control
access-control
access control lists
ACL
administrative access control models
authorisation
automobiles
Cameras
Cloud Computing
cloud-enabled IoT
cloud services
computer architecture
data privacy
Devices
Information Reuse
internet
Internet of Things
IoT
operational models
privacy preserving objectives
pubcrawl
radiofrequency identification
RBAC
Resiliency
role-based access control
security
security preserving objectives
virtual object communication
Virtual Objects
VOs
biblio
Malware Collection and Analysis
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Androids
Big Data
computer security
Data mining
feature extraction
Humanoid robots
Information Reuse
invasive software
malware
Malware Analysis
Malware Collection
malware datasets
National Science Foundation funded project
pubcrawl
Resiliency
security
University of Arizona
biblio
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Algorithm design and analysis
Bayesian network
Bayes methods
constraint-based algorithm
Data mining
data mining model
Data models
directed graphs
distributed hybrid structure learning algorithm
hybrid Bayesian network structure learning
Hybrid Learning
Information Reuse
Knowledge representation
learning (artificial intelligence)
MapReduce
Markov processes
Massive Data
Mutual information
network theory (graphs)
parallel processing
pubcrawl
Resiliency
score-and-search-based algorithm
search problems
security
Structure Learning
styling
uncertain knowledge representation
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
API
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
ontological modeling approach
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
Resiliency
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
software houses
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches