Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability information
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies