Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Scalability
biblio
Copyright Protection for Online Text Information : Using Watermarking and Cryptography
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
Cryptography
information security
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
internet
composability
security risks
Semantics
Syntactics
HTML
Web pages
text analysis
Semantic
Watermarking
copyright
Internet technologies
Information Assurance
digital watermarking
hypertext markup language
intellectual copyright protection
online content copyright protection
online information sharing
online text information
Syntactic
text documents
visible watermarking techniques
web page watermarking
Web text
web-based text
biblio
Analysis of Computer Network Information Security under the Background of Big Data
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
data analysis
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
computer network security
Conferences
network security
Scalability
internet
data acquisition
information system
Big Data
composability
Smart Grids
parallel computing
Xenon
mining
security perception
Quality function deployment
Hafnium compounds
OWL
Information Assurance
big data acquisition
big data analysis platform
Big Data technology
comprehensive arrival
computer network information security
data subject
distributed computing
Frequency locked loops
information security assurance services
Internet era
large-scale network environment
large-scale network security situational awareness
people
Situation Awareness
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
authorisation
Engines
blockchain
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
data privacy
Scalability
personally identifiable information
privacy
composability
Receivers
Python
man-in-the-middle attacks
Sensitivity
man-in-the-middle attack
confidence level
distributed ledger
PII
blockchains
Self-Sovereign Identity
Information Assurance
attribute sensitivity
attribute sensitivity score model
credential exchange
credential exchanges
Data disclosure
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
personal data disclosure
reputation
self-sovereign identity agents
user autonomy
user immutability
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
tools
CPS
cyber-physical systems
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
computer network security
Heuristic algorithms
Scalability
internet
Entropy
information security
composability
Measurement
Cybersecurity
cyberattack
system vulnerabilities
situational awareness
Spatiotemporal phenomena
markov chain
cyber threat
cyberattack resilience
cybersecurity capabilities
cybersecurity risks
data quality
entropy-centric algorithm
graphs
Information Assurance
information-centric cyberattack analysis
intelligence exploitation
networks
spatiotemporal dynamic graphs
spatiotemporal networks
statistically-characterized dynamic graphs
biblio
Harmonizing IT Frameworks and Agile Methods: Challenges and Solutions for the case of COBIT and Scrum
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
information technology
composability
DP management
knowledge management
software development management
solution
software prototyping
agile
agile approach
agile transformation
Capability maturity model
challenge
COBIT
complex domain
corresponding previous case study
digitalization pushes organizations
independent cases
information technologies infrastructure library
Scrum
service capability maturity model
service CMMI
Information Assurance
biblio
Deep Learning-Based Image Analysis Framework for Hardware Assurance of Digital Integrated Circuits
Submitted by grigby1 on Fri, 04/09/2021 - 11:22am
learning (artificial intelligence)
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Hardware
Analytical models
Integrated circuit modeling
Scalability
integrated circuits
deep learning
composability
Task Analysis
electronic engineering computing
Artificial Intelligence (AI)
Image analysis
Hardware Assurance
digital IC
digital ICs
digital integrated circuits
DL-based methods
essential analysis steps
hardware information
hardware information examination and verification
Scanning Electron Microscope images
SEM images
semiautomated training data preparation methods
Information Assurance
biblio
Assurance levels for decision making in autonomous intelligent systems and their safety
Submitted by grigby1 on Fri, 04/09/2021 - 11:22am
security of data
cyber-physical systems
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
Decision Making
safety-critical software
composability
Safety
Artificial Intelligence
cognition
assurance level
assurance level definition
autonomous intelligent system
autonomous intelligent systems safety
autonomous system decision making
cognitive functions
cognitive systems
cognitive techniques dependability
decision function
decision self-making
environmental information
hypothetical safety limitation
pure decision-making capabilities
safety critical activities
safety monitoring design
safety violations
system assurance
unavoidable uncertainty
Information Assurance
biblio
Software Assurance of Autonomous Spacecraft Control
Submitted by grigby1 on Fri, 04/09/2021 - 11:21am
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Software
mobile robots
Scalability
composability
software engineering
Task Analysis
aerospace control
Space vehicles
aerospace computing
software engineers
Hazards
software assurance
assurance case style
assurance cases
autonomous control
autonomous spacecraft control
autonomy demonstration experiment
Fault protection
hazard analysis method
in-orbit CubeSat
software documentation
software hazard analysis
software interactions
Information Assurance
biblio
Morphological Filter Detector for Image Forensics Applications
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Support vector machines
Kernel
feature extraction
image classification
Detectors
image colour analysis
Image forensics
information forensics
Image coding
data compression
Transform coding
Gray-scale
mathematical morphology
Morphology
digital image forensics
binary image compression
binary level documents
deterministic approach
feature extractor
gray level documents
grayscale image compression
image filtering
image forensic identification
image manipulations
media authentication
morphological filter detection
morphological filter detector
noise removal
nonlinear image operators
trained SVM classifier
biblio
A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
learning (artificial intelligence)
Training
feature extraction
CNN
convolution
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
sensor fusion
deep learning
Kernel
Forensics
convolutional neural network
convolutional neural networks
Image forensics
information forensics
signal classification
frequency-domain analysis
discrete cosine transforms
median filters
adaptive filtering layer
AFL
batch normalization operations
classification layer
convolutional stream
discrete cosine transform domain
main frequency range
maxout function
median filtering
median filtering forensics
median filtering manipulation
multiscale convolutional block
multiscale feature fusion strategy
multiscale manipulation features
operational traces
resultant features
Softmax function
1
2
3
4
5
6
7
8
9
…
next ›
last »