Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
Recurrent neural networks
insider threat
data science
attention mechanism
Cyberspace
Metrics
Data mining
composability
History
Organizations
Conferences
policy-based governance
Human behavior
pubcrawl
Neural networks
Insider Threat Detection
Anomaly Detection
biblio
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
deep learning
insider threat
Neural networks
Anomaly Detection
pubcrawl
Human behavior
policy-based governance
network security
performance evaluation
Data models
privacy
Planning
composability
Metrics
Costs
biblio
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
component
insider threat
object detection
styling
style
insert
formatting
Recurrent neural networks
Metrics
deep learning
real-time systems
composability
performance evaluation
policy-based governance
Human behavior
pubcrawl
feature extraction
Predictive models
biblio
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
composability
data augmentation
generative adversarial networks
generative adversarial network
visualization
Adversarial training
Measurement
Metrics
Benchmark testing
insider threat
privacy
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
security
Organizations
biblio
Insider Threat Detection Using An Unsupervised Learning Method: COPOD
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
Human behavior
tree structure analysis
insider threat
Vegetation
Metrics
composability
Companies
Communication networks
policy-based governance
feature extraction
pubcrawl
Intrusion Detection
Insider Threat Detection
Anomaly Detection
Unsupervised Learning
Forestry
security
biblio
GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
Filtering
multi-head attention
multi-autoencoder
GRU
data science
Cyberspace
Measurement
Metrics
composability
Logic gates
Correlation
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Forestry
insider threat
biblio
A Taxonomy of Insider Threat in Isolated (Air-Gapped) Computer Networks
Submitted by grigby1 on Mon, 12/20/2021 - 1:17pm
insider threat
taxonomy
social sciences
security
Resiliency
resilience
research and development
pubcrawl
Metrics
threat mitigation
Human behavior
Focusing
cyber security
computer networks
Computer crime
composability
air-gapped
Air gaps
biblio
DANTE: Predicting Insider Threat using LSTM on system logs
Submitted by aekwall on Mon, 11/08/2021 - 3:22pm
Cancer
CERT dataset
data privacy
information and communication technology
insider threat
logs
LSTM
Measurement
Natural languages
Predictive models
privacy
pubcrawl
Recurrent neural networks
RNN
security
threat vectors
biblio
Detecting Blockchain Security Threats
Submitted by grigby1 on Tue, 04/27/2021 - 2:19pm
insider threat
Organizations
security
Monitoring
blockchain
pubcrawl
resilience
Resiliency
Scalability
information security
Measurement
distributed ledger
permissioned blockchain
Fabrics
security monitoring
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »