Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
A Titration Mechanism Based Congestion Model
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
Load modeling
titration mechanism
telecommunication congestion control
Scalability
resource competing
Resiliency
resilience
Reliability engineering
pubcrawl
network systems
network reliability
network congestion diffusion
Analytical models
global congestion
failure propagation
dynamic changing process
direct physical connection
Couplings
coupled congestion control
congestion model
computer networks
biomolecular network
Biological system modeling
biblio
Modeling and measurement internal threat process based on advanced stochastic model*
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
security model
Stochastic Computing Security
threat behaviors
stochastic petri nets
risk measurement
real-time risk measurement
Petri net computing characteristics
network protection
internal threats
Internal Threat
illegal data
firewall-password model
advanced stochastic model
Petri nets
security of data
complex networks
risk analysis
Stochastic processes
Computational modeling
Data models
Scalability
Mathematical model
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
cyber resilient designs
Resilient Security Architectures
Resiliency
structured system engineering methodology
resilience requirements
Model-based Systems Engineering
mitigate cyber risk
MBSE tools
MBSE
inter-element relationships
graph analytics
graph analytic methods
graph analytic assisted model
engineering cyber resilient systems
design lifecycle
decision analysis methods
security of data
complex models
centralized MBSE database
cyber resilience
resilience
systems engineering
Risk
computer security
risk management
Analytical models
Cybersecurity
tools
graph theory
pubcrawl
Big Data
biblio
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
image-based classification methods
security
Robustness
Resiliency
resilience
pubcrawl
privacy
Microsoft malware dataset
Metrics
malware family classification
malware classification
malware
invasive software
input image
imperceptible nonrandom perturbations
adversarial attacks
image colour analysis
Image color analysis
image classification
Human behavior
feature extraction
convolutional neural networks
convolutional neural network-based malware family classification methods
convolutional neural nets
Conferences
CNN-based malware family classification method
CNN-based classification methods
Analytical models
adversarial example
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
multiclassification support vector machine
Training
Support vector machines
stacked auto-encoder
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
pattern classification
neural nets
network data feature extraction
Analytical models
Multi-classification support vector machine
intrusion detection model
Intrusion Detection
Internet technologies
industrial production
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
Data models
Anomaly Detection
biblio
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
collective attack behavior
Human Behavior and Cybersecurity
unique attack models
intrusion alerts
ground truth data
empirical cyberattack models
empirical attack models
dynamic generation
dynamic Bayesian approach
Dynamic attack models
critical cyber incidents
critical activities
corporate network
competition data
cyberattack
2017 National Collegiate Penetration
automated system
Aggregates
belief networks
Indexes
Analytical models
Cybersecurity
pubcrawl
Human behavior
feature extraction
Bayes methods
IP networks
security of data
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »