Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bipartite graph
biblio
Computational Approaches to Detect Illicit Drug Ads and Find Vendor Communities Within Social Media Platforms
Submitted by aekwall on Mon, 01/11/2021 - 1:39pm
drugs
Text Mining
Opioid Abuse Epidemic
Illicit Drug Ads
Flickr
community detection
Bipartite graph
social media
Deterrence
Scalability
deep learning
machine learning
pubcrawl
Human behavior
Resiliency
Electronic mail
Support vector machines
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
outlier error values
highly structured adjacency matrix structures
increasing sparseness
learning (artificial intelligence)
Matrix decomposition
Metrics
network based attacks
network emulator
network security
network traffic
online learning algorithm
original adjacency matrix
Heuristic algorithms
pubcrawl
representative ecommerce traffic
Resiliency
resultant adjacency matrix
serious economic consequences
singular value decomposition
sparse autoencoder
Sparse matrices
telecommunication traffic
time 225.0 min
decomposition
autoencoder hyper-parameters
Bipartite graph
composability
Compositionality
Computer crime
computer network security
contiguous time intervals
cyber physical systems
Data mining
DDoS Attacks
anomaly detection algorithm
dynamic bipartite graph increments
dynamic graph
dynamic graph mining
dynamic network traffic
Dynamic Networks and Security
ecommerce websites
error distribution
GAAD
gaussian distribution
graph theory
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Complex Network Cybersecurity Monitoring Method
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
resource management
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Task Analysis
system monitoring
special-purpose devices
security sensor
security of data
resource allocation
limited resource allocation
cybersecurity monitoring
complex networks
complex network unit cybersecurity
complex network cybersecurity monitoring
complex network
Bipartite graph
computer security
Scalability
Monitoring
sensors
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
group differential privacy-preserving disclosure
εg-group differential privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
multilevel association graphs
information privacy protection
human factor
Human behavior
group privacy
aggregate information
graph theory
graph data
Electronic mail
drugs
Data protection
data privacy
data analysis
Computing Theory
Bipartite graph
Aggregates
biblio
Insider Threat Event Detection in User-System Interactions
Submitted by grigby1 on Wed, 05/30/2018 - 3:57pm
Anomaly Detection
Bipartite graph
community structure
graph mining
Human behavior
Human Factors
ibm rational clearcase
insider threat
Metrics
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
1
2
next ›
last »