Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Correlation
biblio
"Side channel power analysis of an AES-256 bootloader"
Submitted by grigby1 on Tue, 02/14/2017 - 12:57pm
Hamming weight
Synchronization
side channel power analysis
side channel attacks
secure bootloader
SCA
pubcrawl170102
power measurements
Power measurement
microcontrollers
initialization vector
AES-256 bootloader
firmware files
Entropy
encryption
Cryptography
cryptographic algorithms
CPA attack
correlation power analysis
Correlation
AES-256-CBC
biblio
"Concept for a security investigation framework"
Submitted by abfox on Tue, 02/14/2017 - 12:29pm
malware
Trace Attacks
telecommunication security
standards
SIF
security systems
security investigation framework
Reliability
pubcrawl170101
Multi-Stage Attack
multi-stage APT
malware analyses
advanced persistent threat
log files
lateral movement
Investigation Framework
Forensics
forensic investigations
Correlation
Companies
APT campaigns
APT
advanced persistent threat campaigns
biblio
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
stochastic incomplete feedback
nearest neighbor
real-time control
root mean square error
spatial correlation
spatial data recovery scheme
Spatial databases
stochastic data
stochastic feedback data
measurement uncertainty
Stochastic processes
stochastic traffic patterns
System performance
temporal correlation
temporal data recovery scheme
temporal model identification
time-critical traffic patterns
efficient temporal and spatial data recovery
Computational modeling
Correlation
CPS
cyber-physical system
cyber-physical systems
data handling
Data models
data recovery scheme
auto regressive integrated moving average
ETSDR scheme
feedback loss
incomplete feedback data
integral of absolute error
Mathematical model
mean absolute error
mean square error methods
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 10:26am
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
An adaptive threshold de-noising method based on EEMD
Submitted by BrandonB on Tue, 05/05/2015 - 10:27am
mode mixing problem
White noise
wavelet-based de-noising method
wavelet transforms
wavelet threshold
wavelet base selection
wavelet analysis
Threshold De-noising
threshold de-noised signal dominant layer
Speech
signal-to-noise boundary layer
Signal to noise ratio
signal reconstruction
signal denoising
noise reduction
noise dominant layer filtering
adaptive
filtering theory
ensemble empirical mode decomposition
Empirical mode decomposition
EEMD
decomposition level selection
de-noising signal reconstruction
de-noised layer component
cross-correlation method
correlation theory
Correlation
autocorrelation method
adaptive threshold de-noising method
adaptive determination correctness verification
adaptive determination correctness analysis
biblio
A unified approach to network anomaly detection
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
Big Data
Computer crime
computer network security
continuous-valued data
Correlation
hidden Markov model
Hidden Markov models
HMM
IP networks
Kalman filters
LDS
linear dynamical system
network anomaly detection
network traffic
Ports (Computers)
Robustness
biblio
Using Security Logs for Collecting and Reporting Technical Security Metrics
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
open source technology
Workstations
technical security metric reporting
technical security metric collection
Security Metrics
security logs
security log analysis
security
Peer-to-peer computing
Big Data
Monitoring
Measurement
log analysis techniques
log analysis methods
internet
Correlation
computer network security
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
next ›
last »