Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
application traffic
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
Internet of Things
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
networking conditions
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
QoS monitoring
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
blockchain
blockchain enabled IoBT scenarios
communication resources
Computational modeling
Cryptography
Decentralized Consensus
drones
FastChain simulator
Heuristic algorithms
Human Factors
internet
Internet of battlefield things
Internet of Things
Internet-of-Battlefield-Things
iobt
IoBT devices
lightweight blockchain
military applications
military communication
military computing
Mission critical systems
mission-critical IoBT environment
networked battlefield scenario
NS-3 Simulation
pubcrawl
Scalability
Sharding
sharding approach
visualization
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
computer security
Cybersecurity
cybersecurity techniques
diverse asset ownership
Human Factors
internet
Internet of battlefield things
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoBT operational environments
IoBT systems
IoT assets
IoT technology
learning (artificial intelligence)
machine learning systems
military computing
military operations
military sensing assets
Monitoring
next-generation artificial intelligence
Provenance
pubcrawl
resilience
Scalability
security of data
sensors
smart cities
trust
trust assessment techniques
Trusted Computing
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
distributed denial of service
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
pubcrawl
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
open systems
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
machine learners
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
AI Poisoning
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
detection method
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
feature extraction
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 1:12pm
abusive data collection
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
deep neural network applications
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
lower inference accuracy
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
resilience
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
biblio
Meeting the Demand: Building a Cybersecurity Degree Program With Limited Resources
Submitted by grigby1 on Wed, 11/04/2020 - 1:02pm
Computational modeling
computer aided instruction
computer science
computer science education
Computer Science programs
computer security
cyber physical systems
cybersecurity courses
cybersecurity curriculum
cybersecurity degree program
cybersecurity education
cybersecurity program accreditation criteria
education
educational courses
Educational institutions
further education
Industries
internet
privacy
pubcrawl
publicized cyber-attacks
security of data
universities
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 12:36pm
Complexity theory
internet
Java
learning (artificial intelligence)
Measurement
method-level software metrics
method-level traceable patterns
Metrics
metrics testing
nano-pattern
nanopatterns
Object oriented modeling
Predictive models
program testing
pubcrawl
security
security of data
Software
software metrics
software quality
software security
vulnerabilities
Vulnerability
vulnerability prediction models
vulnerable code
vulnerable methods
web services
biblio
Deceive the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 11:29am
attacker
bioassay developer
bioassay implementation
biochip building blocks
biochips
biological techniques
Biomembranes
bioMEMS
composability
computer network security
control signals
cost-security trade-offs
desieve
highly-skilled-person-hour investment
industrial property
intellectual property rights
intellectual property security
internet
IP networks
IP theft
Lab-on-a-Chip
Microfluidics
Mixers
Multiplexing
obfuscated biochips
policy-based governance
practical sieve-valve based obfuscation
pubcrawl
real-life biochips
resilience
Resiliency
reverse engineering
security of data
Sequential analysis
sieve-valve-based biochips
sieve-valves
Valves
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:11am
5G
batteries
battery limit
Charging stations
connected vehicles
cyber security issues
Electric Vehicles
electrical vehicle communication
energy conservation
energy consumption
Energy Efficiency
environmental benefits
Human Factors
Infrastructure
Intelligent Transportation Systems
internet
Internet information exhange
Internet of electric vehicles
Internet of Things
Internet of Vehicles
IoEV
Metrics
MFemtocell
pubcrawl
resilience
Resiliency
Roads
security
security of data
sensors
Servers
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »