Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
time series
biblio
A Data-Driven Dynamic State Estimation for Smart Grids under DoS Attack using State Correlations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Scalability
Resiliency
pubcrawl
Metrics
smart grid security
Human Factors
time series
cyber attack
data-driven dynamic state estimation
state correlations
Security Risk Estimation
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
An Adaptive Approach for Anomaly Detector Selection and Fine-Tuning in Time Series
Submitted by grigby1 on Tue, 01/21/2020 - 11:59am
Anomaly Detection
Compositionality
expandability
joint learning network
pubcrawl
resilience
Resiliency
self-adaption
time series
transfer learning
biblio
User Behavior Profiling Using Ensemble Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
resilience
Monitoring
MSLSTM
multistate long short term memory
multistate LSTM
network walls
Neural networks
Organizations
policy-based governance
pubcrawl
Metrics
Resiliency
security of data
Servers
spatial-temporal behavior features
time series
Time Series Anomaly Detection
user behavior action sequence
user behavior profiling
ensemble hybrid machine learning
behavioural sciences computing
CNN
collaboration
convolution
convolution neural network
convolution neural networks
convolutional neural nets
cyber security
Anomaly Detection
feature extraction
Human behavior
human behavior impact
insider threat
Insider Threat Detection
learning (artificial intelligence)
machine learning
malicious activities
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
information security
actuator security
Time series analysis
multidimensional time series values prediction
multidimensional time series
information security breaches detection
distributed control systems
distributed control
data prediction
control system security
actuator data
time series
Kernel
control engineering computing
sensor data
process control
network attacks
convolutional neural networks
Training
Metrics
composability
pubcrawl
Human behavior
Resiliency
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
intrusion detection methods
Uniform resource locators
time series construction
Time series analysis
time series
target configuration
security
pubcrawl
predictive security metrics
Predictive models
potential external factors
Metrics
malware
Malicious Traffic
malicious activity
aggregation granularity
incident count forecasting
forecasting
cyber defense
cyber attack occurrences
Correlation
computer network security
Computer crime
binary occurrence metrics
belief networks
Bayesian networks
autoregressive moving average processes
auto-regressive integrated moving average models
ARIMA
biblio
Abnormal Item Detection Based on Time Window Merging for Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
Resiliency
low false alarm rate
MovieLens
object detection
partition rating time series
pubcrawl
rating distribution characteristics RAR
ratio of abnormal rating
recommender systems
resilience
Human Factors
Scalability
security
security of data
shilling attacks
suspicious intervals
time overhead
time series
time window merging
Conferences
abnormal item detection method
ATIAR
average time interval of abnormal rating
Big Data
CFRS
collaborative filtering
collaborative filtering recommendation system
computational cost
abnormal item detection
DAR
data privacy
deviation of time interval of abnormal rating
distribution characteristics
DTIAR
false user profile recognition
Handheld computers
high detection rate
« first
‹ previous
1
2
3
4
5
next ›
last »