Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security logs
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Using Security Logs for Collecting and Reporting Technical Security Metrics
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
open source technology
Workstations
technical security metric reporting
technical security metric collection
Security Metrics
security logs
security log analysis
security
Peer-to-peer computing
Big Data
Monitoring
Measurement
log analysis techniques
log analysis methods
internet
Correlation
computer network security