Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Provenance
biblio
Suitability of Blockchain for Collaborative Intrusion Detection Systems
Submitted by aekwall on Tue, 10/12/2021 - 3:21pm
collaboration
blockchain
Intrusion Detection
Peer-to-peer computing
pubcrawl
Metrics
Resiliency
Human behavior
composability
Technological innovation
Provenance
and Anomaly-based IDS
collaborative intrusion detection
Signature-based IDS
biblio
An Anti-Collusion Fingerprinting based on CFF Code and RS Code
Submitted by aekwall on Tue, 10/12/2021 - 3:21pm
Fingerprint recognition
Reed-Solomon codes
Reed-Solomon code
leak traceability
digital fingerprinting
Data Security
concatenated coding
Collusion Attacks
CFF
Provenance
Organizations
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
Resists
biblio
Exploring Provenance Needs in Software Reverse Engineering
Submitted by aekwall on Tue, 10/12/2021 - 3:20pm
Interviews
pubcrawl
Metrics
Resiliency
Human behavior
composability
reverse engineering
Provenance
Qualitative User Study
Visual Analytics-Provenance
biblio
Tactical Provenance Analysis for Endpoint Detection and Response Systems
Submitted by aekwall on Tue, 10/12/2021 - 3:20pm
security
Task Analysis
tools
pubcrawl
Metrics
Resiliency
Human behavior
composability
Manuals
Provenance
Fatigue
knowledge based systems
Skeleton
biblio
A Unique Approach towards Image Publication and Provenance using Blockchain
Submitted by aekwall on Tue, 10/12/2021 - 3:20pm
blockchain
contracts
Conferences
information technology
pubcrawl
Metrics
Resiliency
Human behavior
composability
Media
Provenance
digital content
ethereum
Publishing
smart contracts
biblio
Storage and Querying of Large Provenance Graphs Using NoSQL DSE
Submitted by aekwall on Tue, 10/12/2021 - 3:20pm
pubcrawl
Metrics
Resiliency
Human behavior
composability
Big Data
DSE
graph
NoSQL
Provenance
biblio
Prov-IoT: A Security-Aware IoT Provenance Model
Submitted by grigby1 on Thu, 08/12/2021 - 4:20pm
IoT security
security metadata
security
risk management
resilience
pubcrawl
provenance-based security
provenance graph
privacy
metadata
IoT-Health scenario
Provenance
IoT provenance model
Internet of Things
documentation
data propagation
Computational modeling
composability
Resiliency
Metrics
Human behavior
biblio
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack
Submitted by grigby1 on Wed, 05/05/2021 - 12:23pm
Provenance
Human behavior
Metrics
Resiliency
composability
Cloud Computing
Communication networks
Complexity theory
Conferences
Forensics
metadata
pubcrawl
Scalability
Scalable Security
security
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »