Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Describing Advanced Persistent Threats Using a Multi-Agent System Approach
Submitted by grigby1 on Mon, 03/19/2018 - 12:54pm
natural language
threat intelligence information
software security requirement analysis
Servers
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Organizations
advanced persistent threat attacks
multiagent system approach
multi-agent systems
Metrics
malware
Lead
Human behavior
attack trees
Analytical models
agent-oriented social modelling approaches
advanced persistent threats
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Hybrid Model of Rule Based and Clustering Analysis for Big Data Security
Submitted by grigby1 on Tue, 02/27/2018 - 1:40pm
Analytical models
Anomaly Detection
Big Data
Communication networks
composability
Data models
machine learning
privacy
pubcrawl
resilience
Resiliency
security
Security analysis
Sparks
tools
biblio
Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Openflow firewall
Smart Grids
smart grid security
Smart Grid
Scalability
Resiliency
resilience
pubcrawl
Probabilistic Model Checking
Probabilistic logic
advanced metering infrastructure
Metrics
Mathematical model
Markov processes
Markov Decision Process
Firewalls (computing)
distributed denial of service
Computer crime
Analytical models
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Topic Evolution Modeling in Social Media Short Texts Based on Recurrent Semantic Dependent CRP
Submitted by grigby1 on Tue, 02/06/2018 - 12:34pm
semantic dependent Chinese restaurant process
word co-occurrence modeling
Twitter dataset
topic modeling
tools
Text Mining
text analytics
text analysis
social networking (online)
Social network services
social media short texts
Social Media Analytics
short-text oriented topic evolution model
Semantics
semantic similarity information
Adaptation models
sdTEM
Scalability
rsdCRP
recurrent semantic dependent CRP
pubcrawl
Metrics
Media
LDA
Human Factors
Human behavior
HDP
Data models
composability
Analytical models
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »