Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
authentication
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
medical robotic surveillance
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
queueing theory
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
ROS-enabled robotic systems
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
availability attacks
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
Human behavior
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
peer to peer application
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
robot hack acquistion
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
security of data
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
file servers
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
Convolutional Neural Network for Text Classification (TextCNN)
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
biblio
Interference of Cyber Endanger using Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
advanced badgering
assembling
basic ordinary language sections
burden their mates
composability
cosmology
cyber endanger
cyber-tormenting cases
cyberbullying
Hinduja
Interference
internet
less steeply-esteemed acknowledgment displays
line associations
mobile phones
monetary machine
on-line exchanges
Patching
PC systems
persistent repeated mischief
Predictive Metrics
pubcrawl
Resiliency
robotized revelation
SDA
security of data
sort machine
support vector machine
Support Vector Machine(SVM)
Support vector machines
Web record remark
Web structure associations
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 1:35pm
blacklisting
business communication
computer network security
Couplings
Crawlers
drive-by download
graph theory
graph-based model
Human behavior
Industries
internet
linkage analysis
malicious destinations
malicious domain name
malicious domain names
Malicious URL
malicious URL linkage analysis
malware
Malware Analysis
Metrics
open-source threat intelligence
privacy
pubcrawl
real enterprise network
resilience
Resiliency
Uniform resource locators
URL
Web pages
website
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 11:30am
Assessment
assessment techniques
coding practices
composability
feasible security practices results
input validation coding practices
input validation practices
internet
pubcrawl
quality model
secure code
security of data
security perspective
security vulnerabilities
software quality
software security
trustworthiness
trustworthiness assessment
vulnerabilities
Web application
web applications
biblio
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters
Submitted by grigby1 on Wed, 12/02/2020 - 1:01pm
bottleneck capacity
computer centres
coupled congestion control
Couplings
datacenter
guest OS
Hardware
hypervisor control traffic
internet
Internet-wide benefits
minimally-invasive congestion management
multitenant datacenters
operating systems (computers)
Proposals
pubcrawl
Receivers
reduced interflow competition
Registers
resilience
Resiliency
Scalability
Switches
TCP congestion control
TCP connections
TCP receiver window
TCP sending rate
telecommunication congestion control
telecommunication traffic
transport protocols
unequal share
Virtual machine monitors
virtual machines
biblio
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
coupled congestion control
end-to-end transparency
fixed network providers
high bandwidth utilization
internet
Load management
load-balancers
low computational complexity
mobile network providers
multiple paths
ORTA
Out of order
packet level load balancing research
packet reordering problem
per-packet load balancing
Proposals
pubcrawl
receiver sides
Receivers
resilience
Resiliency
resource allocation
Robustness
Routing protocols
Scalability
TCP end-points
TCP packet reorderings
TCP sender end-hosts
TCP traffic
telecommunication congestion control
telecommunication traffic
Transparent reordering robust TCP proxy
transport protocols
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
Bayes methods
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
computer network reliability
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
coupling model
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
power information
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
Bandwidth
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Light trail WiMAX (World Interoperability for Microwave Access Network)
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
pubcrawl
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
telecommunication network topology
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »