Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber security
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
API
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
hybrid feature selection
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
K-NN
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
performance indicator metrics
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
biblio
Cyber Security Assessment of the Robot Operating System 2 for Aerial Networks
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
aerial networks
authentication
autonomous aerial vehicles
autonomous systems
control engineering computing
Cryptography
cyber security
cyber security assessment
Data Distribution Service standard
DDS security architecture
DDS standard
drones
encryption
GCS
ground control station
Human behavior
Human Factors
middleware
military computing
military grade unmanned systems
military systems
military-centric robotics platform
mobile robots
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System 2
robot operating systems
robot programming
robotic middleware
robots
ROS
ROS 1 security vulnerabilities
ROS 2
security
standards
UAV swarms
unmanned Naval aerial swarms
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 1:14pm
privacy
security of data
collaboration
Monitoring
business data processing
pubcrawl
policy-based governance
data privacy
outsourcing
data encryption
computer security
component
cloud service
design
Task Analysis
cybercrimes
architecture
data sharing
Peer-to-peer computing
Portals
organization
privacy concerns
Lakes
cyber security
collaborative data sharing
confidential data sharing
cyber security data sharing
cyber security information
data anonymization
Data Sanitization
diagram
flexible data sharing
information
large-scale enterprise
large-scale enterprises
managed security service
managed security service provider
Managed security services
MSS platform customers
MSSP
multi-tenant
platform solution
Policy
private sectors
public sectors
use case
Security Policies Analysis
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
learning (artificial intelligence)
security of data
Training
machine learning
cyber security
Monitoring
pubcrawl
resilience
Resiliency
Safety
Scalability
Data models
Computer crime
cyber-attacks
business processes
cyber-threats
Cyber Attacks
cyber- attacks
destiny attacks
deterministic styles
digital global community
information safety measure
Network Monitoring
semantic machine
software technologies
stochastic styles
Stochastic Computing Security
biblio
Tackling Class Imbalance in Cyber Security Datasets
Submitted by aekwall on Mon, 11/09/2020 - 12:12pm
security of data
Time measurement
machine learning algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Training
cyber-attacks
computer security
cyber security
Predictive models
Compositionality
class imbalance problem
class imbalance
cyber security datasets
information infrastructure
old attacks
outdated datasets
SANTA dataset
Size measurement
UNSW-NB15
Velocity measurement
Information Reuse and Security
biblio
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 12:36pm
air pollution control
back propagation neural network training
Backpropagation
battery testers
battery testing
BP NN
cyber security
cyber security threat
electric vehicle
electric vehicle market
Electric Vehicles
EV batterys state of charge
EV BMS cyber security
greenhouse gas emission policies
Measurement
Metrics
metrics testing
neural nets
neural network
neural network SOC prediction
NeuralWare software
power engineering computing
pubcrawl
security of data
stability
state of charge
statistic metrics
statistical analysis
biblio
Cyber security standards and issues in V2X communications for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:08am
Ad hoc networks
ad-hoc type network
compromised vulnerabilities
connected vehicles
current V2X communications
cyber security
cyber security standards
design
DSRC
Human Factors
international standards
internet
Internet of Vehicles
ITS
ITS environment
Metrics
mobile computing
mobile radio
pubcrawl
resilience
Resiliency
security issues
security of data
smart power grids
standardisation
standardisation approaches
standardisation bodies
standardisation organisations
telecommunication security
Telecommunication standards
V2X
Vehicles significant developments
vehicular communication security
Vehicular Communication Systems
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
cyber security
data plane development kit
DPDK-SRIOV
DPDK-SRIOV.
general hardware platform
Hardware
high-performance network
i-o systems security
I/O requirement
i/o systems security
I/O throughput performance
input-output programs
Kernel
network security testing devices
optimisation
optimization
performance evaluation
performance optimization
physical network card
pubcrawl
Scalability
security of data
SRIOV technology
Switches
Throughput
virtual machines
virtual network
virtual network security tester
virtualisation
Virtualization
virtualized network
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
Adaptation models
Computational modeling
cyber security
deep learning models
deep neural networks
Ensemble forest
feature extraction
Forestry
Gray-scale
Human behavior
hybrid model
invasive software
learning (artificial intelligence)
malware
malware authors
malware classification
malware detection
malware images
malware patterns
Metrics
microsoft windows
multilayered random forest ensemble technique
pattern classification
privacy
pubcrawl
resilience
Resiliency
traditional malware
Vision-based malware analysis
biblio
Empirical Validation of System Dynamics Cyber Security Models
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
False Data Detection
Computational modeling
computer security
continuous simulation
cyber security
cyber security modeling
cyber-attacks/defenses
empirical behavior test
empirical structural test
empirical validation
Expert Systems and Security
Human behavior
Mathematical model
model builder
model structure
Numerical models
pubcrawl
Resiliency
Scalability
security of data
Servers
simulation and modeling
standards
System Dynamics
system dynamics cyber security models
system dynamics model validation
1
2
3
4
5
6
7
8
9
…
next ›
last »