Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Compositionality
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
security of data
Servers
Internet of Things
IoT devices
security
Protocols
Resiliency
pubcrawl
Libraries
Python
software engineering
Java
information security
Compositionality
TEE
framework
side-channel attacks
graphical user interfaces
graphical user interface
interface definition language files
IoT security software
partitioning
partitioning security components
remote procedure calls
RPC
RPC based framework
RPC-based framework
RPC-based solutions
software partitioning
TEE integration time
trusted execution environments
Information Reuse and Security
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
distributed denial of service
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
pubcrawl
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
open systems
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
machine learners
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
biblio
Requirements Patterns Structure for Specifying and Reusing Software Product Line Requirements
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
security
Software
Resiliency
pubcrawl
Unified modeling language
Formal Specification
Proposals
Compositionality
formal verification
Systematics
documentation
systems analysis
RePa requirements pattern template
requirement engineering activities
Requirements Patterns
requirements patterns structure
Requirements Reuse
software artifacts
software development phases
Software Product Line Engineering
software product line requirements
software product lines
software requirement pattern structure
SPLE
SRP structure
Information Reuse and Security
biblio
Face Recognition Based on Densely Connected Convolutional Networks
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
pattern classification
convolution
recurrent neural nets
Compositionality
face recognition
CAS-PEAL-Rl dataset
CASIA-WebFace dataset
dense block layers
dense face model
densely connected convolutional networks
densely connected convolutional neural network
face recognition methods
face recognition model
face verification accuracy
LFW dataset
residual network
Information Reuse and Security
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
computer network security
security
Protocols
real-time systems
Industrial Control Systems
Resiliency
pubcrawl
standards
automation
security architecture
Local area networks
industrial control
information technology
security requirements
Compositionality
communication security
operational technology
automation-friendly security solution
open systems
PROFINET
real-time Ethernet automation systems
Information Reuse and Security
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
Intrusion Detection
security of data
Data models
Electronic mail
Resiliency
pubcrawl
standards
unsolicited e-mail
spam filtering
Mathematical model
data analysis
statistical analysis
Compositionality
Loading
Euclidean distance
Aitchison transformation
Compositional data
compositional data analysis
compositional vectors
data science models
data-based power transformation
ILR
information system security applications
isometric log ratio transformation
Least squares approximations
partial least squares discriminant analysis
PLS-DA algorithm
spam filters
Information Reuse and Security
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 12:12pm
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
deep learning
Training
convolutional neural nets
data compression
Image coding
discrete cosine transforms
convolution
distortion
Transform coding
Compositionality
CNN model
Steganography
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
J-UNIWARD
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
biblio
Tackling Class Imbalance in Cyber Security Datasets
Submitted by aekwall on Mon, 11/09/2020 - 12:12pm
security of data
Time measurement
machine learning algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Training
cyber-attacks
computer security
cyber security
Predictive models
Compositionality
class imbalance problem
class imbalance
cyber security datasets
information infrastructure
old attacks
outdated datasets
SANTA dataset
Size measurement
UNSW-NB15
Velocity measurement
Information Reuse and Security
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 12:11pm
address-space layout randomization
advanced attacker
ASLR
code addresses
code gadgets
code pointers
Compositionality
computer science
Electronic mail
exploitation
information disclosure detection
information disclosure mitigation
Information Reuse and Security
just-in-time code-reuse attacks
Layout
Memory management
multiple position-independent ROP
Payloads
Position-Independent Code-Reuse Attacks
pubcrawl
relative memory
Resiliency
security
security of data
Software
software reusability
source code (software)
Vulnerability
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:42pm
telecommunication security
Resiliency
pubcrawl
privacy
Metrics
MANET
mobile ad hoc networks
mobile ad hoc network
Mobile communication
Compositionality
malicious attacks
Trust management
mobile nodes
malicious function
Mobie ad hoc networks
mobile network protection
neighbor trust-based mechanism
neighbor trust-based security scheme
temporal link
manet privacy
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »