Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Databases
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Adaptation models
database management systems
Servers
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
digital data
Databases
information forensics
Terminology
acquisition and preservation category
analysis and reconstruction category
Database forensic investigation
database forensic investigation processes
database forensics
design science research methodology
harmonized DBFI process
investigation process model
Planning
preparation and pre-response category
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
insider threat
security of data
Cloud Computing
relational databases
security
insider attacks
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Load modeling
mobile computing
knowledge based systems
Metrics
load balancing
resource allocation
Cloud Security
Peer-to-peer computing
launch attacks
cloud systems
Availability
centralized model
cloud computing structures
cloud RDMS
cloud relational database systems
Databases
insider threat tackling
mobile-knowledge bases model
multiple availability zones
Peer to peer computing
peer-to-peer model
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
insider threat
security of data
Organizations
security
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Databases
information technology
Metrics
software engineering
Weapons
attack planning
chronological timelines
Educational institutions
indicators
insider IT sabotage
insider threat cases
insider threats indicators
Materials
sabotage
Sociotechnical
software installation
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Facial Expression Recognition Based on Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:01pm
facial recognition
convolutional neural nets
convolutional neural networks
Databases
emotion recognition
emotions
Face
face landmarks detection
face recognition
facial expression databases
facial expression recognition
facial expression recognition classification
facial landmark detection
feature extraction
fully automatic facial expression recognition
graph convolutional neural network
Graph Neural Network
graph theory
Human behavior
image classification
image recognition
Metrics
object detection
pubcrawl
resilience
Resiliency
Support vector machines
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
Organizations
Classification algorithms
Resiliency
Databases
Clustering algorithms
Data mining
Random access memory
pubcrawl
database management systems
Compositionality
memory space
hash table
hash algorithms
apriori
apriori mining algorithm
association rules
find frequent item sets
frequent 1-item sets counts
Frequent item sets
important algorithms
Improved
improved apriori algorithm
Itemsets
linked list
LinkedList
biblio
Integrity Auditing with Attribute based ECMRSA Algorithm for Cloud Data Outsourcing
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
Cloud Computing
Servers
abe
security
Protocols
Resiliency
pubcrawl
Cryptography
Databases
Predictive Metrics
Compositionality
data integrity
outsourcing
encryption audits
data sharing
data auditing
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
active directory
antivirus software
APT attack chain
Attack detection
Chained Attacks
common domain intrusion methods
Communication networks
Computer crime
Computer hacking
computer network security
Databases
domain attack detection rules
domain control
domain intrusion detection system
domain related attack behavior characteristics
effective market-oriented products
feature extraction
Forgery
log file
network attack detection method
network security
network security threats
normal attack
pubcrawl
real-time systems
resilience
Resiliency
Scalability
security protection
tools
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Big Data
command injection attacks
composability
dangerous threat
database management systems
database protection
Databases
firewalls
Firewalls (computing)
GreenSQL
GreenSQL database firewall
GreenSQL learning
GreenSQL pattern input whitelist
Information systems
input model
intercept samples
internet
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
Resiliency
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
biblio
Network Security System on Multiple Servers Against Brute Force Attacks
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
brute force attacks
Communication networks
Databases
Fail2ban
Force
Human behavior
Human Factors
IDPS
IDS
IP networks
Monitoring
network security
policy-based governance
pubcrawl
security
Servers
1
2
3
4
5
6
7
8
9
…
next ›
last »