Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time series analysis
biblio
Using GRU neural network for cyber-attack detection in automated process control systems
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
neural nets
Neural Network Security
operating parameters
multivariate time series
information security breaches
GRU-neural network training
forecasting theory
forecasting multivariate time series
end system devices
cyber-attack detection
automated process control systems
APCS
Time series analysis
forecasting
Metrics
security of data
deep learning
production engineering computing
process control
water treatment
control engineering computing
collaboration
policy-based governance
pubcrawl
time series
Neural networks
Anomaly Detection
security
Training
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
information security
actuator security
Time series analysis
multidimensional time series values prediction
multidimensional time series
information security breaches detection
distributed control systems
distributed control
data prediction
control system security
actuator data
time series
Kernel
control engineering computing
sensor data
process control
network attacks
convolutional neural networks
Training
Metrics
composability
pubcrawl
Human behavior
Resiliency
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
intrusion detection methods
Uniform resource locators
time series construction
Time series analysis
time series
target configuration
security
pubcrawl
predictive security metrics
Predictive models
potential external factors
Metrics
malware
Malicious Traffic
malicious activity
aggregation granularity
incident count forecasting
forecasting
cyber defense
cyber attack occurrences
Correlation
computer network security
Computer crime
binary occurrence metrics
belief networks
Bayesian networks
autoregressive moving average processes
auto-regressive integrated moving average models
ARIMA
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by grigby1 on Fri, 03/15/2019 - 11:55am
Resiliency
wavelet transforms
wavelet spectra correlation analysis
wavelet analysis
time-and-frequency localization
time-and-frequency distribution
Time series analysis
time series
Time Frequency Analysis
system security
security
Scalability
Accidents
resilience
pubcrawl
potential system security threat prediction identification
potential risks
potential risk
Metrics
Injuries
correlation methods
Correlation analysis
Correlation
biblio
Time Series Forecasting by Evolving Deep Belief Network with Negative Correlation Search
Submitted by grigby1 on Wed, 03/06/2019 - 4:30pm
resilience
neural nets
neural network models
Neural networks
optimisation
optimization
policy-based governance
pubcrawl
random search
Negative correlation search
Resiliency
Scalability
search problems
time series
Time series analysis
time series datasets
time series forecasting
Training
forecasting theory
Bayesian optimization
belief networks
collaboration
composability
DBN
Deep Belief Network
derivative-free optimizer-negative correlation search
forecasting
Bayes methods
grid search
Human behavior
hyperparameters optimization
learning (artificial intelligence)
learning rates
Load modeling
Mathematical model
Metrics
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »