Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat detection
biblio
Cyber Threat Analysis and Trustworthy Artificial Intelligence
Submitted by grigby1 on Fri, 06/09/2023 - 1:13pm
quantum computing
machine learning algorithms
machine learning
pubcrawl
resilience
privacy
Quantum mechanics
Data Breach
Data Analytics
Web servers
Reinforcement learning
supervised learning
Resiliency
Trustworthy AI
threat detection
Cybersecurity Damage Assessment
biblio
Cyber-Security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance Cameras
Submitted by grigby1 on Mon, 04/18/2022 - 10:57am
resilience
YOLO
threat detection
surveillance
Substations
Streaming media
Security Risk Estimation
Scalability
risk assessment
Conferences
pubcrawl
Metrics
Meters
Human Factors
fully convolutional deep network
detection algorithms
Cyber-security
Convolutional codes
biblio
IoT Threat Detection Advances, Challenges and Future Directions
Submitted by grigby1 on Thu, 08/12/2021 - 4:22pm
architecture
challenges
composability
computer architecture
Computer crime
future directions
Human behavior
IoT
IoT security
Metrics
pubcrawl
resilience
Resiliency
sensors
Task Analysis
threat detection
biblio
A Three-Stage Machine Learning Network Security Solution for Public Entities
Submitted by aekwall on Tue, 04/27/2021 - 1:34pm
Portals
RegSOC
network protection
abuse-mailbox
abuse reports
SIEM
predictability
Security Heuristics
threat detection
social networking (online)
Monitoring
Communication networks
NLP
Cybersecurity
pubcrawl
Resiliency
real-time systems
security
Scalability
IP networks
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 2:21pm
security of data
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
Monitoring
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
embedded security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
artificial intelligence security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
biblio
Towards a Conversational Agent for Threat Detection in the Internet of Things
Submitted by aekwall on Mon, 12/16/2019 - 2:28pm
Internet of Things
Virtual Assistant
user speech
threat detection
telecommunication traffic
situational awareness
Scalability
pubcrawl
network traffic
network information
Metrics
invasive software
Intrusion Detection
conversational agents
Human behavior
DynamoDB Table
DDoS
conversational agent
conversation agents
consumer IoT networks
computer network security
Cloud Computing
botnet
anomalous traffic
Amazon Echo
Alexa
1
2
next ›
last »