Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
time series
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by grigby1 on Fri, 03/15/2019 - 11:55am
Resiliency
wavelet transforms
wavelet spectra correlation analysis
wavelet analysis
time-and-frequency localization
time-and-frequency distribution
Time series analysis
time series
Time Frequency Analysis
system security
security
Scalability
Accidents
resilience
pubcrawl
potential system security threat prediction identification
potential risks
potential risk
Metrics
Injuries
correlation methods
Correlation analysis
Correlation
biblio
Time Series Forecasting by Evolving Deep Belief Network with Negative Correlation Search
Submitted by grigby1 on Wed, 03/06/2019 - 4:30pm
resilience
neural nets
neural network models
Neural networks
optimisation
optimization
policy-based governance
pubcrawl
random search
Negative correlation search
Resiliency
Scalability
search problems
time series
Time series analysis
time series datasets
time series forecasting
Training
forecasting theory
Bayesian optimization
belief networks
collaboration
composability
DBN
Deep Belief Network
derivative-free optimizer-negative correlation search
forecasting
Bayes methods
grid search
Human behavior
hyperparameters optimization
learning (artificial intelligence)
learning rates
Load modeling
Mathematical model
Metrics
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
Detection of Temporal Insider Threats to Relational Databases
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
pubcrawl
Training
time series
temporal insider threat detection
Temporal Attacks
security of data
security
Resiliency
resilience
relational databases
relational database security
real-time systems
real-time anomaly detection
query processing
query features
access anomalies
Periodicity
Metrics
legitimate data access
Insider Threats
Human behavior
feature extraction
Data Security
data misuse
Data Analytics for Security
Data Analytics
data analysis
composability
Anomaly Detection
biblio
A Practical Evaluation of Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke time series
time series
time 5 min
time 30 min
time 2.5 min
time 10 min
time 1 min
temporal data order
sliding window
sessions
pubcrawl
Metrics
Measurement
Human behavior
keystroke analysis
Keyboards
integrated circuits
Human Factors
authentication
behavioral biometric
biometrics (access control)
continuous user authentication
Data collection
free-text keystroke dynamics
Heuristic algorithms
biblio
Spectral Keyboard Streams: Towards Effective and Continuous Authentication
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke dynamics
Vectors
timing
Time series analysis
time series
spectral keyboard streams
robust authentication mechanisms
pubcrawl
online learning platforms
on-line assessment
Metrics
learning (artificial intelligence)
keystroke time series
Keystroke Streams
authentication
keystroke analysis
Keyboards
keyboard user monitoring
keyboard dynamics
Human Factors
Human behavior
discrete wavelet transforms
discrete wavelet transform
Discrete Fourier transforms
discrete Fourier transform
Continuous Authentication
benchmark feature vector representation
behavioral biometric
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl
« first
‹ previous
1
2
3
4
5
next ›
last »