Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
Compressive Detection of Random Signals from Sparsely Corrupted Measurements
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
privacy
testing
Task Analysis
sparsely corrupted measurements
Sparse matrices
sparse error
signal reconstruction
signal processing tasks
signal processing
signal detection problem
signal detection
Resiliency
resilience
random signals
pubcrawl
composability
Noise
Detectors
detection
dense noise
data amount
cyber physical systems
Cyber Physical System
Current measurement
CSP techniques
CS reconstruction
compressive sampling
compressive detection problem
Compressive detection
compressed sensing
biblio
Improvement of Security System Level in the Cyber-Physical Systems (CPS) Architecture
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
Metrics
smart cloud computing adoption framework
Smart CCAF
security system level
security of data
security framework
security
SCCAF
Resiliency
resilience
pubcrawl
production engineering computing
physical entities
node information
Microelectronics Security
Microelectronics
Cloud Computing
IoT
Internet of Things
integrated circuits
information security
Industry 4.0
Detectors
cyber-physical systems
CPS architecture
CPS
computer elements
computer architecture
Computational modeling
composability
cloud computing technology
biblio
Towards a security monitoring plane for named data networking and its application against content poisoning attack
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
Measurement
security of data
security monitoring plane
security monitoring approach
security issues
security
Scalability
Resiliency
pubcrawl
NDN specification
NDN node
named data networking
Monitoring
microdetector
clean slate
IP networks
internet
Information Centric Networks
information centric networking paradigm
Hypothesis testing
Detectors
computer network security
clean-slate approach
Bayesian Network techniques
Bayesian network structure
Bayesian network
Bayes methods
Anomaly Detection
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
EDMAND: Edge-Based Multi-Level Anomaly Detection for SCADA Networks
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
network traffic data
telecommunication traffic
supervisory control and data acquisition systems
security of data
security
Scalability
SCADA systems
SCADA network traffic
Resiliency
resilience
pubcrawl
Protocols
network-based intrusion detection
Anomaly Detection
Monitoring
Metrics
malicious attacks
large-scale distributed industrial systems
Image edge detection
event detection
EDMAND
edge-based multilevel anomaly detection
edge detection
Detectors
composability
appropriate anomaly detection methods
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
Drone Detection and Identification System Using Artificial Intelligence
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
drone imagery
surveillance
robot vision
Resiliency
pubcrawl
OpenCV library
object detection
Metrics
machine learning
learning (artificial intelligence)
Image Processing
Human behavior
feature extraction
drones
drone industry
approaching drone
drone identification system
Detectors
detection
deep learning
control engineering computing
comprehensive drone detection system
composability
classifier
Cameras
camera images
autonomous aerial vehicles
artificial intelligence security
Artificial Intelligence
biblio
Actuator deception attack detection and estimation for a class of nonlinear systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
pubcrawl
H∞optimisation
H∞performance optimization
Human behavior
Metrics
Monitoring
nonlinear control systems
nonlinear discrete-time systems
nonlinear systems
estimation theory
Resiliency
Safety
Safety Monitoring System
security of data
state/output estimator
system running status monitoring
unknown deception attacks
unknown inputs
attack/attacker action estimator
active safety monitoring system
Actuator Deception Attack
actuator deception attack detection
actuator security
actuators
Attack detection
attack detector
Attack Estimation
active attack estimator
composability
control system analysis
control system synthesis
control systems safety
Detectors
discrete time systems
estimation
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:33pm
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »