Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Alarm systems
biblio
The Design of Campus Security Early Warning System based on IPv6 Wireless Sensing
Submitted by grigby1 on Fri, 02/24/2023 - 4:31pm
sensors
wireless sensing
CSI
Alarm systems
Personnel
video surveillance
IPv6
Policy Based Governance
real-time systems
collaboration
composability
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Design of transmission line safety early warning system based on big data variable analysis
Submitted by grigby1 on Wed, 06/08/2022 - 12:56pm
virtual reality
transmission line
security early warning system
big data variable analysis
Alarm systems
intelligent data
Resiliency
Image Processing
smart cities
computer architecture
Scalability
power transmission lines
Compositionality
Big Data
resilience
pubcrawl
security
biblio
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms
Submitted by grigby1 on Tue, 04/12/2022 - 11:16am
composability
information sharing
Data Sanitisation
Alarm systems
cyber threat intelligence
Data Sanitization
Interconnected Systems
Compositionality
information management
pubcrawl
Production
data privacy
privacy
Ecosystems
Conferences
Resiliency
resilience
Human behavior
biblio
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
energy consumption
Neural Network Security
Threat early warning
optimized algorithm
network security threat real-time early warning
network security threat perception algorithm
network security threat detection process
Improved ant colony algorithm
ant colony optimisation
ant colony algorithm
Alarm systems
neural network
security
Metrics
Artificial Intelligence
stability
network security
real-time systems
Big Data
Communication networks
computer network security
collaboration
policy-based governance
pubcrawl
biblio
A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/12/2020 - 11:01am
hybrid alarm management strategy
Vulnerability Analysis
similarity-based correlation
signature-based intrusion detection systems
Signature-based IDS
sensors
Scalability
Resiliency
resilience
Prelude SIEM
Minimization
Measurement
IP networks
intrusion detection system
Intrusion Detection
signature based defense
HP Arsight priority formula
false alarm reduction
false alarm minimization
event normalizer
dynamic network context information
digital signatures
Databases
cybersecurity defense strategy
Correlation
Alarm systems
alarm prioritization
alarm correlation techniques
pubcrawl
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems