Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microsoft windows
biblio
Continuous and Adaptive Learning over Big Streaming Data for Network Security
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
learning setup
telecommunication traffic
Stream Machine Learning
security
Scalability
Resiliency
resilience
pubcrawl
off-the-shelf stream learning approaches
network traffic monitoring
network security
network attacks
microsoft windows
Metrics
machine learning algorithms
machine learning
Adaptation models
learning model
learning (artificial intelligence)
Dynamic Networks and Security
Data models
continual learning
computer network security
composability
big-data
big streaming data
big data security in the cloud
Big Data analytics platform
Big Data
analysis tasks
adaptive learning models
adaptive learning
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
real-time requirements
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
cyber breaches
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
Anomaly Detection
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
security of data
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
biblio
Fast Bi-dimensional Empirical Mode based Multisource Image Fusion Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
Hilbert transforms
Wireless communication
variable neighborhood window method
surface interpolation
source image features
pubcrawl
multisource image fusion decomposition
microsoft windows
Metrics
Market research
interpolation
Image reconstruction
image fusion
image decomposition
BEMD method
Hermite interpolation reconstruction method
Hermite interpolation
fixed neighborhood window method
fast bi-dimensional empirical mode decomposition
Empirical mode decomposition
details information
decomposition
cyber physical systems
Computational efficiency
Compositionality
BIMF
bi-dimensional intrinsic mode functions
bi-dimensional empirical mode decomposition
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
biblio
LSTM-Based Detection for Timing Attacks in Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
delays
feature extraction
Human behavior
internet
microsoft windows
Named Data Network Security
privacy
pubcrawl
resilience
Resiliency
Scalability
Time-frequency Analysis
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
Submitted by grigby1 on Fri, 04/17/2020 - 11:29am
microsoft windows
Windows Operating System Security
vulnerability statistics
vulnerability databases
Vulnerability
security
Resiliency
resilience
pubcrawl
operating systems (OSs)
intrusion tolerance
Metrics
forever-day vulnerabilities
diversity
Days-of-grey-risk
Databases
Computer hacking
computer architecture
composability
biblio
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
pubcrawl
internet
live data forensics
Metrics
microsoft windows
Microsoft Windows (operating systems)
online front-ends
open source tool
postmortem analysis
Forensics
public domain software
Public key
resilience
Resiliency
Web Wallets
Windows Operating System Security
Windows systems
automated forensic process
forensic traces
forensic research
forensic acquisition
Digital Forensics
Cryptographic Hash Function
cryptocurrency forensics
cryptocurrencies
Computer crime
composability
Browsers
bitcoin web wallet
Bitcoin forensics
Bitcoin clients
bitcoin
automated live forensic
biblio
Detecting Adversary using Windows Digital Artifacts
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
microsoft windows
XTEC
Windows operating systems
Windows Operating System Security
Windows digital artifacts
third-party sensors
Task Analysis
Shimcache
sensors
security of data
Resiliency
resilience
pubcrawl
Prefetching
Microsoft Windows (operating systems)
advanced persistent threat
Metrics
malicious behaviors
machine learning
learning (artificial intelligence)
Incident Response
History
Forensics Investigation
file execution
estimation
composability
APT
application compatibility cache
adversary detection
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »