Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A methodology to improve the assessment of vulnerability on the maritime supply chain of energy
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
Oceans
worldwide maritime network
world traffic
vulnerability assessment
transportation possibilities
Transportation
supply chains
supply chain management
spatial structure
security
Sea measurements
raw materials
pubcrawl170112
Ports (Computers)
economic dependency
network modelling
merchant navy
maritime territories
maritime supply chain
maritime safety
maritime network
marine systems
marine communication
industrialized countries
graph theory
freight distribution
freight containers
freight containerization
biblio
Shot Boundary Detection with Graph Theory Using Keypoint Features and Color Histograms
Submitted by grigby1 on Wed, 03/08/2017 - 2:06pm
image segmentation
video signal processing
video shot boundary detection
Vectors
temporal feature vectors
SVM
Support vector machines
Segmentation
pubcrawl170111
Measurement
key point feature matching
Color
image matching
image colour analysis
Image color analysis
Histograms
graph theory
graph cuts
feature extraction
edge detection
comprehensive frame information
color histograms
biblio
Detecting anomalies in Online Social Networks using graph metrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:02pm
Measurement
structural characteristic analysis
Stars
social networking (online)
Social network services
security of data
Regression
pubcrawl170111
personalized user profile
online social networks
Oddball algorithm
Anomaly
Image edge detection
graph theory
graph metrics
Fitting
feature extraction
Curve fitting
Cliques
Brokerage
anomaly activity detection
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
global flow diagram
Virtual machining
unauthorized access risks
unauthorized access
security of data
pubcrawl170108
pubcrawl170107
multilevel hybrid cloud algorithm
legitimacy detection
graph theory
global flow graph
Access Control
Frequency modulation
formal representation
detection algorithms
detection algorithm
Decision Making
data access
Cloud Computing
Algorithm design and analysis
access violation
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »