Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security events
biblio
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm
Submitted by grigby1 on Wed, 08/16/2023 - 3:39pm
IDS
Sequential event patterns
security events
probabilistic attack prediction
knowledge based anomaly detection
IPAM
Intrusion detection by Event Analysis
Generalized Sequential Patterns (GSP)
CSE-CIC-IDS 2018 data set
Behavioral sciences
Intelligent systems
feature extraction
Prediction algorithms
network security
DDoS Attacks
Benchmark testing
composability
Data models
Resiliency
resilience
pubcrawl
security
biblio
Feature Selection for Attacker Attribution in Industrial Automation amp; Control Systems
Submitted by aekwall on Tue, 01/25/2022 - 3:56pm
control systems
attribution
system events
security events
Linux OS
Attribute selection
attacker profile
attacker attribution
automation
security
Transportation
Safety
composability
Human behavior
Metrics
pubcrawl
feature extraction
statistical analysis
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 10:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Research of Security Situational Awareness and Visualization Approach in Cloud Computing
Submitted by grigby1 on Thu, 03/28/2019 - 3:12pm
data visualisation
storage resource utilization
standardization
situational information
situational awareness
security situational awareness
secure information
high-efficiency advantage
emergency response methods
elastic resource pooling
cloud computing security
Data visualization
Cloud Computing
network security
security events
sensors
resource allocation
composability
Resiliency
Metrics
pubcrawl
resilience
Computational modeling
security of data
biblio
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
security of data
Pervasive Computing Security
pubcrawl
resilience
Resiliency
security
security analytics
security events
security information and event management system
persists event data
security operator
security-related event logs
security-related events
SIEM
storage management
Storms
Throughput
tuning options
distribution frameworks
Big Data
Big Data challenge
composability
custom-built distribution solution
cyber-attacks
Distributed databases
distributed processing
distributed SIEM platform
Autonomic Security
event processing
in memory database
in-memory database
in-memory platform
malicious activities
normalization
persistence speed
biblio
Intrusion detection systems vulnerability on adversarial examples
Submitted by grigby1 on Mon, 01/21/2019 - 12:14pm
Intrusion Detection Systems
vulnerability detection
Training
security of data
security events
Resiliency
pubcrawl
Neurons
Metrics
intrusion detection systems vulnerability
adversarial examples
Intrusion Detection
Human behavior
Compositionality
Classification algorithms
Biological neural networks
attack vector
anomaly-based intrusion detection
anomaly detection systems ability
Anomaly Detection
biblio
CVSS-Based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Silicon
SIEM systems
SIEM
Security Metrics
security information and event management system
security events
risk management
risk assessment
Resiliency
resilience
Reliability
pubcrawl
Prototypes
network characteristics
attack graphs
Measurement
integrated security metrics
cyber situational awareness
CVSS-based probabilistic risk assessment
CVSS
countermeasure selection
computer network security
computer network risk assessment
composability
Common Vulnerability Scoring System
authentication
attacker characteristics
Attack Modeling
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution