Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data generation
biblio
Design of Cyber-Physical Security Testbed for Multi-Stage Manufacturing System
Submitted by grigby1 on Fri, 05/26/2023 - 3:31pm
composability
data generation
cyber-physical
network systems
cyber range
Global communication
Resiliency
testbed
testing
cyber-physical systems
CPS Security
collaboration
Prototypes
Cybersecurity
Scalability
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Monitoring
security
biblio
Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning
Submitted by aekwall on Mon, 01/11/2021 - 12:41pm
data handling
strict privacy guarantee
realistic fake data generation
private FL-GAN
Lipschitz limit
high-quality synthetic data generation
GAN training
differential privacy synthetic data generation
differential privacy sensitivity
differential privacy generative adversarial network model
data-holders
data generation
federated learning
security of data
data sharing
differential privacy
neural nets
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
information security
data privacy
Scalability
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 9:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime