Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
Detecting Periodic Subsequences in Cyber Security Data
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
identifyingautomated network events
traditional signature-based detection systems
statistical analysis
signature based defense
Scalability
Resiliency
resilience
pubcrawl
probability models
probability
maximum likelihood estimation
Los Alamos National Laboratory's enterprise computer network
invasive software
Anomaly Detection
digital signatures
data sets
Data models
cyber-security defence
cyber security data
computer networks
computer network security
computer network behaviour
Computational modeling
changepoint detection framework
automated network events
authentication
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
Metrics
Training
testing
steganography detection
Steganography
statistical model
statistical analysis
single-image detector
pubcrawl
privacy
pooled steganalysis
Payloads
payload spreading strategy
optimal detection
omniscient Warden
Adaptation models
matched filters
matched filter
likelihood ratio test
image matching
image filtering
distortion
Detectors
content-adaptive batch steganography
content-adaptive additive embedding schemes
composability
Batch steganography
Additives
adaptive embedding
biblio
Support Vector Machine for Network Intrusion and Cyber-Attack Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
network intrusion
Training
threat vectors
telecommunication traffic
Support vector machines
support vector machine
statistical techniques
statistical analysis
security of data
pubcrawl
privacy
Ports (Computers)
anomaly-based IDS
ML techniques
Metrics
Measurement
machine learning
Local area networks
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
cyber-security threats
cyber-attack detection
biblio
Web Caching Evaluation from Wikipedia Request Statistics
Submitted by grigby1 on Mon, 03/26/2018 - 12:54pm
Servers
Zipf distributed requests
wireless networks
Wikipedia request statistics
Wikipedia pages
Wikipedia daily top-1000 statistics
Wikipedia caches
Web sites
web caching strategies
Web caching evaluation
Web Caching
statistical analysis
simulation
access time reduction
Scalability
Resiliency
resilience
pubcrawl
Metrics
internet
hit rate
Encyclopedias
Electronic publishing
Conferences
cache storage
biblio
Misclassifications: The Missing Link
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
missing link
writing style moulds
Writing
Training
text analysis
Syntactics
Support vector machines
stylometry
stylometric cues
statistical methods
statistical analysis
recommender systems
recommendation system
pubcrawl
proximity
author attribution problem
misclassified books
misclassifications
Metrics
literary style
Length measurement
learning (artificial intelligence)
Human behavior
feature extraction
Electronic mail
domain experts
classification
book similarity
authors
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Scalability
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
human factor
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
data analysis
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
bitcoin
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
biblio
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
simulated hardware platform
ultra-high reliability levels
theoretical feasibility
testing
test time expansion problem
Test Time Expansion
statistical testing
statistical test
statistical assurance
statistical analysis
software-intensive system
software reliability
software assurance
Software
simulation tests
composability
Scalability
reliability theory
Reliability
pubcrawl
protection system
programmable systems
program testing
platform simulation approach
Hardware
Failure Probability
estimation
Emulation/Simulation-enhanced Test
empirical failure probability estimation
continuous operation systems
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »