Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hidden Markov model
biblio
An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness
Submitted by aekwall on Fri, 01/20/2023 - 4:11pm
active learning
composability
Computational modeling
hidden Markov model
Hidden Markov models
Intrusion Detection
Manuals
Markov processes
network security
Predictive Metrics
pubcrawl
real-time systems
Resiliency
security situational awareness
situational awareness
uncertainty
biblio
Analyzing Cryptographic API Usages for Android Applications Using HMM and N-Gram
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
Cryptography
Markov processes
Libraries
tools
Analytical models
pubcrawl
composability
Probabilistic logic
Compositionality
Hidden Markov models
android
API analysis
cryptographic API
hidden Markov model
N-gram
theoretical cryptography
biblio
A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems
Submitted by grigby1 on Tue, 08/17/2021 - 3:57pm
Kernel
system calls
standards
Resiliency
resilience
pubcrawl
Metrics
Linux Operating System Security
Linux operating system
Anomaly Detection
Intrusion Detection
host-based intrusion detection
Hidden Markov models
hidden Markov model
Computational modeling
composability
Band-pass filters
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Natural Language Processing Based Part of Speech Tagger using Hidden Markov Model
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Hidden markov-model
Viterbi algorithm
tagged sentences
supervised learning
stochastic taggers
rule based taggers
POS tagging
part-of-speech tagging
part of speech tagger
natural language processing applications
Malayalam language
Indian languages
Scalability
hidden Markov model
Hidden Markov models
language translation
tagging
natural language processing
Stochastic processes
Computational modeling
pubcrawl
Human behavior
Resiliency
Conferences
biblio
Virtual Machine Failure Prediction Method Based on AdaBoost-Hidden Markov Model
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
Predictive models
VM security state
VM failure state
Virtual machining
virtual machines
virtual machine security
virtual machine failure prediction method
virtual machine
Upper bound
software fault tolerance
security
pubcrawl
AdaBoost-hidden Markov model
predictive ability
Prediction algorithms
observation state
learning (artificial intelligence)
hidden state
Hidden Markov models
hidden Markov model
Failure Prediction
cloud platform environment
Cloud Computing
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
Scalability
return-oriented programming
resilience
pubcrawl
hidden Markov model
Chained Attacks
attack code detection
1
2
next ›
last »