Nome |
# |
On Algorithms Selection for Unsupervised Anomaly Detection, file e398c37d-b7e0-179a-e053-3705fe0a4cff
|
2.488
|
Context-Awareness to improve Anomaly Detection in Dynamic Service Oriented Architectures, file e398c37a-6ff1-179a-e053-3705fe0a4cff
|
378
|
Development and validation of a safe communication protocol compliant to railway standards, file e398c380-e4dd-179a-e053-3705fe0a4cff
|
377
|
Continuous Biometric Verification for Non-Repudiation of Remote Services, file e398c37c-12cb-179a-e053-3705fe0a4cff
|
344
|
Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile, file e398c37b-ecbb-179a-e053-3705fe0a4cff
|
316
|
Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection, file e398c380-d5cd-179a-e053-3705fe0a4cff
|
287
|
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection, file e398c381-2f04-179a-e053-3705fe0a4cff
|
259
|
Continuous User Identity Verification for Trusted Operators in Control Rooms, file e398c379-da86-179a-e053-3705fe0a4cff
|
254
|
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application, file e398c381-5448-179a-e053-3705fe0a4cff
|
237
|
Exploring Anomaly Detection in Systems of Systems, file e398c37b-203b-179a-e053-3705fe0a4cff
|
233
|
A model to discipline autonomy in cyber-physical systems-of-systems and its application, file e398c380-8dc0-179a-e053-3705fe0a4cff
|
223
|
Model-Driven Fault Injection in Java Source Code, file e398c380-4901-179a-e053-3705fe0a4cff
|
217
|
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d5d2-179a-e053-3705fe0a4cff
|
206
|
Detect Adversarial Attacks against Deep Neural Networks with GPU Monitoring, file e398c382-005c-179a-e053-3705fe0a4cff
|
196
|
Using metamodels to improve model-based testing of service orchestrations, file e398c380-b033-179a-e053-3705fe0a4cff
|
177
|
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c37f-4a34-179a-e053-3705fe0a4cff
|
175
|
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c37a-4afb-179a-e053-3705fe0a4cff
|
170
|
Identification of critical situations via Event Processing and Event Trust Analysis, file e398c380-c9b1-179a-e053-3705fe0a4cff
|
163
|
Continuous and Transparent User Identity Verification for Secure Internet Services, file e398c37f-1ae4-179a-e053-3705fe0a4cff
|
158
|
A Monitoring and Testing Framework for Critical Off-the-Shelf Applications and Services, file e398c37d-2023-179a-e053-3705fe0a4cff
|
157
|
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c37f-575e-179a-e053-3705fe0a4cff
|
144
|
Design, implementation, and assessment of a usable multi-biometric continuous authentication system, file e398c37f-1432-179a-e053-3705fe0a4cff
|
143
|
Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach, file e398c380-febf-179a-e053-3705fe0a4cff
|
137
|
Exploiting MDE for Platform-Independent Testing of Service Orchestrations, file e398c37e-dfe3-179a-e053-3705fe0a4cff
|
130
|
On trustworthy measurements when testing dependable systems: a discussion and experiences, file e398c37f-4703-179a-e053-3705fe0a4cff
|
118
|
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c381-07fd-179a-e053-3705fe0a4cff
|
117
|
On the educated selection of unsupervised algorithms via attacks and anomaly classes, file e398c37f-3ffa-179a-e053-3705fe0a4cff
|
97
|
Introducing Meta-Requirements for Describing System of Systems, file e398c380-b76a-179a-e053-3705fe0a4cff
|
88
|
Risk assessment of a biometric continuous authentication protocol for internet services, file e398c37b-9412-179a-e053-3705fe0a4cff
|
83
|
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform, file e398c381-1aa0-179a-e053-3705fe0a4cff
|
80
|
benchmarking networked music performance tools with the nmp-bench model and architecture, file e398c381-ab4c-179a-e053-3705fe0a4cff
|
75
|
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, file 2f15baaf-c4bf-43a6-972b-eb4b37be6414
|
72
|
Labelling Relevant Events to Support the Crisis Management Operator, file e398c37b-90e4-179a-e053-3705fe0a4cff
|
70
|
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape, file 0b6144c5-cc38-4cd3-8718-a827cc12ae85
|
64
|
Analysis of critical systems through rigorous, reproducible and comparable experimental assessment, file e398c378-c46e-179a-e053-3705fe0a4cff
|
63
|
System and Network Security: Anomaly Detection and Monitoring, file e398c37a-8efa-179a-e053-3705fe0a4cff
|
62
|
STECA – Security Threats, Effects and Criticality Analysis: Definition and Application to Smart Grids, file e398c37d-5e52-179a-e053-3705fe0a4cff
|
61
|
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems, file e398c380-2584-179a-e053-3705fe0a4cff
|
49
|
Towards security requirements: Iconicity as a feature of an informal modeling language, file e398c37b-b5b0-179a-e053-3705fe0a4cff
|
36
|
SYSML-UML Like Modeling Environment Based on Google Blockly Customization, file e398c37d-0571-179a-e053-3705fe0a4cff
|
35
|
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c381-14ec-179a-e053-3705fe0a4cff
|
34
|
Tolerate Failures of the Visual Camera With Robust Image Classifiers, file b7771d0c-fec1-43ad-ae83-05a6a9386978
|
33
|
Robust Traffic Sign Recognition Against Camera Failures, file 0c9eb9ab-78aa-4d1a-a33a-73ce0459c768
|
31
|
A multi-criteria ranking of security countermeasures, file e398c381-0de1-179a-e053-3705fe0a4cff
|
30
|
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c380-c89b-179a-e053-3705fe0a4cff
|
21
|
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c381-14eb-179a-e053-3705fe0a4cff
|
21
|
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems, file e398c379-5b75-179a-e053-3705fe0a4cff
|
16
|
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach, file e398c37f-2929-179a-e053-3705fe0a4cff
|
15
|
Metodo e apparato per una segnalazione resiliente del tempo, file e398c380-bb91-179a-e053-3705fe0a4cff
|
15
|
Design and Evaluation of a Safe Driver Machine Interface, file e398c378-a3aa-179a-e053-3705fe0a4cff
|
10
|
MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems, file a43863d7-bbc0-4a33-9bda-f7ee3a176e67
|
8
|
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard, file ad9f5138-0078-4f40-942b-eb34797d075e
|
7
|
A multi-criteria ranking of security countermeasures, file e398c37a-b461-179a-e053-3705fe0a4cff
|
5
|
Evaluating Object (Mis)Detection From a Safety and Reliability Perspective: Discussion and Measures, file 334f675c-8e5c-4e2d-b2e2-fbb14a256cae
|
3
|
Intrusion detection without attack knowledge: Generating out-of-distribution tabular data, file e397f6e5-ac2f-4ec6-8a9b-bd096149302b
|
2
|
Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c379-5efd-179a-e053-3705fe0a4cff
|
2
|
Towards a Collaborative Framework to Improve Urban Grid Resilience, file e398c37a-5533-179a-e053-3705fe0a4cff
|
2
|
Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c37a-83b3-179a-e053-3705fe0a4cff
|
2
|
Basic concepts on Systems of Systems, file e398c37b-1d8a-179a-e053-3705fe0a4cff
|
2
|
Managing dynamicity in SoS, file e398c37b-241c-179a-e053-3705fe0a4cff
|
2
|
Time and Resilient Master Clocks in Cyber-Physical Systems, file e398c37b-29e9-179a-e053-3705fe0a4cff
|
2
|
A Model-Based Approach for Analyzing the Autonomy Levels for Cyber-Physical Systems-of-Systems, file e398c37e-107a-179a-e053-3705fe0a4cff
|
2
|
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d0d8-179a-e053-3705fe0a4cff
|
2
|
Towards a General Model for Intrusion Detection: An Exploratory Study, file 955e0aac-7aef-405c-9ccd-a6889831735a
|
1
|
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach, file b59ac1cc-f4d5-4533-b67e-4600e6314c22
|
1
|
RGB cameras failures and their effects in autonomous driving applications, file d8225124-a1ab-40e3-87e3-0d375db5c055
|
1
|
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems, file e398c378-c038-179a-e053-3705fe0a4cff
|
1
|
A testing service for lifelong validation of dynamic SOA, file e398c378-c43b-179a-e053-3705fe0a4cff
|
1
|
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b4-179a-e053-3705fe0a4cff
|
1
|
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b5-179a-e053-3705fe0a4cff
|
1
|
ALARP (A Railway Automatic Track Warning System Based on Distributed Personal Mobile Terminals), file e398c378-f7e6-179a-e053-3705fe0a4cff
|
1
|
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock, file e398c379-587b-179a-e053-3705fe0a4cff
|
1
|
Analysis of Companies Gaps in the Application of Standards for Safety-Critical Software, file e398c379-587e-179a-e053-3705fe0a4cff
|
1
|
Safe Estimation of Time Uncertainty of Local Clocks, file e398c379-5f02-179a-e053-3705fe0a4cff
|
1
|
An Experimental Framework for the Analysis and Validation of Software Clocks, file e398c379-5f04-179a-e053-3705fe0a4cff
|
1
|
On the impact of emergent properties on SoS security, file e398c37a-8395-179a-e053-3705fe0a4cff
|
1
|
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c37a-84cb-179a-e053-3705fe0a4cff
|
1
|
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios, file e398c37a-8b3e-179a-e053-3705fe0a4cff
|
1
|
A Hazus-based method for assessing robustness of electricity supply to critical smart grid consumers during flood events, file e398c37a-a947-179a-e053-3705fe0a4cff
|
1
|
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results, file e398c37e-91a0-179a-e053-3705fe0a4cff
|
1
|
The SAMBA approach for self-adaptive model-based online testing of services orchestrations, file e398c37e-91a2-179a-e053-3705fe0a4cff
|
1
|
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c380-e187-179a-e053-3705fe0a4cff
|
1
|
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c381-0028-179a-e053-3705fe0a4cff
|
1
|
Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?, file e398c381-d02d-179a-e053-3705fe0a4cff
|
1
|
Totale |
9.027 |