Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hidden Markov models
biblio
Cross-layer security framework for smart grid: Physical security layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
physical layer security
Trojan horses
smart power grids
smart power grid cyber technology
Smart Grids
smart grid security
Smart Grid
process control system
Process Control Security
process control
predictive control
power system security
physical security layer
conceptual layering model
PCS
Monitoring
isolated security tool
Hidden Markov models
hardware Trojan threat
Hardware
CyNetPhy PSL resolution
cross-layer security framework
Cross-Layer Security
cooperative real-time security system
control systems
biblio
A unified approach to network anomaly detection
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
Big Data
Computer crime
computer network security
continuous-valued data
Correlation
hidden Markov model
Hidden Markov models
HMM
IP networks
Kalman filters
LDS
linear dynamical system
network anomaly detection
network traffic
Ports (Computers)
Robustness
biblio
Multi-touch Attribution in Online Advertising with Survival Theory
Submitted by BrandonB on Mon, 05/04/2015 - 2:18pm
internet
user interaction data
user conversion probability prediction
survival theory
rule-based attribution models
probability
probabilistic framework
Predictive models
online advertising
Multi-touch attribution
Kernel
advertising
Hidden Markov models
Hazards
Gold
digital advertising
data-driven multitouch attribution models
Data models
data handling
commercial advertising monitoring company
advertising data processing
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
biblio
Identifying users with application-specific command streams
Submitted by BrandonB on Thu, 04/30/2015 - 1:52pm
receiver operating characteristic
machine learning
machine learning algorithms
message authentication
Mice
Microsoft
MS Word commands
Radio frequency
random forests
learning (artificial intelligence)
RF
ROC curve
sensitivity analysis
user command streams
user identification
user profiles
user-issued commands
Active Authentication
Keyboards
Intrusion Detection
Human-computer interaction
human computer interaction
Hidden Markov models
GUI-based application
Classification algorithms
biometrics (access control)
Behavioral biometrics
authentication
AUC
area under the curve
application-specific command streams
AdaBoost
active authentication model
« first
‹ previous
1
2
3
4
5
6