Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
Deliberative and Affective Reasoning: a Bayesian Dual-Process Model
Submitted by aekwall on Mon, 02/10/2020 - 11:09am
Intelligent Agents
affective reasoning
Artificial agents
BayesAct agents
Bayesian dual-process model
computationally tractable model
decision theoretic reasoning
emotional level
free energy
human experience
human social networks
affective alignment
intelligent computational agents
plausible model
social experiences
social order
social sciences computing
social-psychological Bayesian affect control theory
social-psychological theory
socio-technical system
sociological theory
technological agents
inference mechanisms
Bayes methods
pubcrawl
Computational modeling
multi-agent systems
collaboration
chatbots
Complexity theory
cognition
Human Factors
Markov Decision Process
Scalability
Artificial Intelligence
Biological system modeling
affective computing
human interaction
social interactions
psychology
Social Agents
active inference
affect control theory
biblio
Towards probabilistic identification of zero-day attack paths
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
Predictive Metrics
Zero Day Attacks and Defense
zero-day attack paths
ZePro
sockets
probabilistic identification
object instance graph
intrusion propagation
enterprise network security defense
Bayesian network
belief networks
computer network security
Communication networks
probability
Probabilistic logic
composability
pubcrawl
Resiliency
feature extraction
Bayes methods
security
Conferences
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
Crypto-Aided Bayesian Detection of False Data in Short Messages
Submitted by grigby1 on Mon, 12/30/2019 - 1:21pm
Human behavior
Wireless communication
signal processing
short messages
Resiliency
resilience
Relays
pubcrawl
probability
Physical layer
missed detection
maximum a posteriori probability rule
Map
low overhead
low latency
lightweight cryptographic detection
Bayes methods
False Data Injection
False Data Detection
false data
false alarm
Electrostatic discharges
detection outcomes
detection error
detection accuracy
cyber physical systems
Cryptography
cryptographic detection
crypto-aided Bayesian detection framework
Conferences
composability
Bayesian detection
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Towards a security monitoring plane for named data networking and its application against content poisoning attack
Submitted by aekwall on Mon, 08/05/2019 - 9:44am
Measurement
security of data
security monitoring plane
security monitoring approach
security issues
security
Scalability
Resiliency
pubcrawl
NDN specification
NDN node
named data networking
Monitoring
microdetector
clean slate
IP networks
internet
Information Centric Networks
information centric networking paradigm
Hypothesis testing
Detectors
computer network security
clean-slate approach
Bayesian Network techniques
Bayesian network structure
Bayesian network
Bayes methods
Anomaly Detection
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 9:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »