Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability detection
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Identifying security vulnerabilities of weakly detectable network parameter errors
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
measurement uncertainty
weakly detectable network parameter errors
weakly detectable network model parameter errors
vulnerability detection
security vulnerabilities identification
security
Resiliency
real-time systems
pubcrawl
Pricing
power systems
power system economics
power markets
power generation
network model parameters
Metrics
Compositionality
market security
locational marginal prices
Load flow
LMP
IEEE 14-bus system
Human behavior
gaussian distribution
financial tools
day-ahead markets
cyber security issues
CRR market calculations
CRR holders
Congestion Revenue Rights markets
congestion patterns
congestion charges
biblio
Vulnerability analysis and consequences of false data injection attack on power system state estimation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
nonlinear system model
vulnerability detection
Vulnerability Analysis
state estimation
Resiliency
pubcrawl
power transmission lines
power system state estimation
power system security
physical line
optimization
AC state estimation
Metrics
Load modeling
Load flow
Limiting
Human behavior
FDI attack
false data injection attack
DC optimal power flow
Compositionality
bi-level optimization problem
biblio
False data injection attack in smart grid topology control: Vulnerability and countermeasure
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
smart power grids
pubcrawl
real power flow measurement
reliability perspectives
renewable energy sources
residue based bad data detection
Resiliency
security of data
Smart Grids
smart grid topology control
power system state estimation
stability check
state estimation
Substations
system control operation
Topology
topology control
Transient analysis
vulnerability detection
Metrics
Compositionality
Conferences
crucial factor
cyber security issue
false data injection attack
FDIA
Human behavior
IEEE 24 bus reliability test system
Load flow
AC state estimation
modern power system
online stability check result
physical system stability
power engineering computing
power flow measurement
power system reliability
power system security
power system stability
biblio
Vulnerability prediction through self-learning model
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
self-learning model
Vulnerability prediction
Vulnerability impact
vulnerability detection
Training
Software Vulnerability
software reliability
software fault tolerance
software fault
software development phase
software defect
Software algorithms
Software
Activation Function
Resiliency
pubcrawl
Predictive models
neural nets
Metrics
Mathematical model
learning (artificial intelligence)
Human behavior
Compositionality
Artificial Neural Networks
artificial neural network
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Vulnerability detection with deep learning
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
Compositionality
convolution
convolution neural network
deep learning
Human behavior
long short term memory
machine learning
Metrics
Neural networks
pubcrawl
Resiliency
Software
Task Analysis
tools
Training
vulnerability detection
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »