Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
Protocols
Virtual private networks
supercomputing user behavior
supercomputing business process
Supercomputers
supercomputer
Security Policies Analysis
security of data
security level optimization
security level improvement
security incident detection
security analysis method
security
resource use tracking
pubcrawl
audit policy
policy-based governance
operation records
operating systems
mass storage
mainframes
log analysis
Linux
Human Factors
Correlation analysis
Correlation
complete user behavior path restoration
collaboration
business data processing
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
biblio
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Firewalls (computing)
Shadow mapping
security policy query engine
security policies
radically disjunctive approach
query processing
pubcrawl
policy-based governance
Policy
Government
Governance
FPQE
anomaly resolution
firewalls
firewall rules
firewall configuration
firewall anomalies
Explosions
Engines
Electronic mail
Correlation
correction process
collaboration
biblio
Identifying Relationships in Vehicular Sensor Data: A Case Study and Characterization
Submitted by grigby1 on Wed, 05/17/2017 - 1:51pm
bluetooth security
composability
Correlation
gear
Human behavior
obd
pubcrawl
Resiliency
rpm
sensors
VANET
vehicle speed
biblio
Perceptual blur detection and assessment in the DCT domain
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
just noticeable blur concept
Support vector machines
subjective scores
statistical modelling
statistical features
statistical analysis
quality score
pubcrawl170111
perceptual blur detection
perceptual blur degradation
perceptual blur assessment
Measurement
machine learning system
learning (artificial intelligence)
BBQM metric
JNB concept
image restoration
Image resolution
Image edge detection
feature extraction
discrete cosine transforms
discrete cosine transform
DCT domain
Databases
Correlation
Blurring
blind quality metric
blind blur quality metric
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 12:39pm
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Reconstruction-free inference on compressive measurements"
Submitted by grigby1 on Tue, 02/21/2017 - 1:10pm
Image reconstruction
SWIR
subNyquist sampling rates
SPC
spatial-multiplexing cameras
single-pixel camera
signal-to-noise ratios
short-wave infrared region
reconstruction-free inference
pubcrawl170104
pseudorandom spatial masks
nonlinear feature extraction
inference mechanisms
imaging devices
action recognition
Image coding
high-level visual inference problems
high-dimensional signals
feature extraction
face recognition
Face
Databases
correlational features
Correlation
compressive measurements
compressive cameras
coded measurements
Cameras
biblio
"FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics"
Submitted by abfox on Tue, 02/14/2017 - 1:28pm
highly scalable distributed feature collection and correlation engine analysis engine
time windows
security of data
security intelligence
security analytics
real-time systems
query processing
pubcrawl170101
production network query
low latency query responses
low latency Big Data analytics
IP networks
advanced persistent threat infection detection
geographically distributed large data sets
fluxing domain name detection
Feature Selection
feature extraction
FCCE
Distributed databases
Data mining
cyber security domain
Correlation
computer security
Big Data
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
next ›
last »