Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
HMM
biblio
Random-Byzantine Attack Mitigation in Cognitive Radio Networks using a Multi-Hidden Markov Model System
Submitted by grigby1 on Fri, 09/18/2020 - 1:57pm
radiofrequency interference
Cognitive Radio Security
television frequency spectrum
secondary users
random-Byzantine Attack mitigation
primary user emulation attack
multiHidden Markov Model system
Cognitive Radios
cognitive radio networks
byzantine attacks
CRN
pubcrawl
white space
signal detection
radio spectrum management
cognitive radio
HMM
Hidden Markov models
wireless channels
telecommunication security
Resiliency
resilience
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Traffic State Estimation with Big Data
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Control Theory
Cyber Physical System
cyber physical systems
HMM
Human behavior
pubcrawl
resilience
Resiliency
Scalability
SEA
System State Network
Traffic State Estimation
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Conversational Agent Learning Natural Gaze and Motion of Multi-Party Conversation from Example
Submitted by grigby1 on Wed, 11/28/2018 - 2:01pm
conversational agent
conversational agents
gaze
HMM
Human behavior
machine learning
Metrics
pubcrawl
Scalability
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 10:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
A unified approach to network anomaly detection
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
Big Data
Computer crime
computer network security
continuous-valued data
Correlation
hidden Markov model
Hidden Markov models
HMM
IP networks
Kalman filters
LDS
linear dynamical system
network anomaly detection
network traffic
Ports (Computers)
Robustness
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack