Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
XAI-Driven Explainable Multi-view Game Cheating Detection
Submitted by aekwall on Mon, 03/01/2021 - 4:02pm
Scalability
Task Analysis
Data models
Resiliency
pubcrawl
internet
Games
Predictive models
visualization
Artificial Intelligence
explainable AI
virtual reality
artificial intelligence techniques
computer games
xai
industrial application
AI models
detection framework
explainable artificial intelligence
audience profiles
cheating classifiers
cheating detection
debugging
EMGCD
evidence generation
game health
game industries
illegal automated plugins
model compression
model debugging
multiple game productions
NetEase Games
online game
Online Games
online gaming
online persistent virtual world
player enjoyment
reason generation
trustworthy performance
XAI-driven explainable multiview game cheating detection
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 3:42pm
Monitoring
telecommunication traffic
real-time systems
Resiliency
pubcrawl
composability
Metrics
internet
Fuzzy logic
fuzzy set theory
control systems
delays
wireless mesh networks
Linguistics
queueing theory
explicit rate messages
future queue state
fuzzy framework
network traffic load
performance efficiency
queue length
safe traffic adaptation
safe traffic adaptation model
self-configured technology
self-organized technology
Wireless Mesh Network Security
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
affiliation graphs
computer network management
device discovery and management
encryption-invariant device management strategy
future traffic demand
graph theory
internet
IP networks
Local area networks
management complexity
network administrators
Network reconnaissance
network-connected devices
passive network reconnaissance
pubcrawl
resilience
Resiliency
Scalability
security analysts
security risk
university campus network
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 1:38pm
security
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
Communication networks
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
Clocks
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
packet header bits
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
blockchain
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
Economics
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
network communities reputation
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
reputation systems
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
actionable contracts
actors
auditable secure network overlays
auditing
communication fabric
composability
computer network security
contracts
Cryptography
Data collection
Data processing
data sharing
digital data market place infrastructure
internet
marketplace
Metrics
multidomain distributed applications
multidomain overlay network
network accountability
operational infrastructure
organisational boundaries
overlay network
overlay networks
Prototypes
pubcrawl
Public key
resilience
Resiliency
software stack
Virtual private networks
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Software
Task Analysis
Support vector machines
machine learning
pubcrawl
graph theory
internet
tools
Libraries
supply chain management
neural network
Measurement
Databases
reverse engineering
Predictive Metrics
Microprogramming
Classification algorithms
supervised learning
nearest neighbor search
Bayes method
clustering methods
k-nearest neighbor search
Matrices
vector
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:38pm
security of data
Scalability
Classification algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
social networking (online)
internet
Libraries
Mathematical model
natural language processing
cyber security
Attack detection
social engineering
blacklisting
Forestry
future attacks
natural language processing steps
potential attacks
SEADer++ v2
social attacks
social engineering attacks detection
social networks potential hackers
biblio
Vicinity-based Replica Finding in Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:37pm
computer network security
network security
Scalability
Resiliency
Human behavior
pubcrawl
Routing
internet
telecommunication network routing
network topology
Routing protocols
named data networking
content delivery performance
content identifier
content object
default forwarding
NDN architectures
NDN forwarding
network overhead
overhead costs
replica finding efficiency
replica finding mechanism
sub-optimal delivery efficiency
vicinity-based replica finding scheme
1
2
3
4
5
6
7
8
9
…
next ›
last »