Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
belief propagation
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
A Domain Is Only As Good As Its Buddies: Detecting Stealthy Malicious Domains via Graph Inference
Submitted by grigby1 on Wed, 03/06/2019 - 4:31pm
belief networks
belief propagation
collaboration
composability
dns data analysis
Human behavior
Inference algorithms
malicious domains detection
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
biblio
DNS graph mining for malicious domain detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
multiple malicious domains
IP resolutions
labeled domains
malicious domain detection technique
malicious probabilities
Malware Analysis
malware detection
Markov processes
message passing
Metrics
IP networks
Nickel
potential malicious domains
privacy
probability
pubcrawl
resilience
Resiliency
variety cyber attacks
graph mining
belief propagation
belief propagation algorithm
computer network security
cyber security
Data mining
DNS data servers
DNS graph mining
Domain Resolution
Graph Interface
attackers
graph mining task
graph node
graph theory
graph-based interface
Human behavior
Inference algorithms
internet
invasive software
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information
Submitted by grigby1 on Wed, 08/02/2017 - 1:52pm
belief propagation
composability
graph mining
pubcrawl
Resiliency
trust prediction
web of trust
biblio
Robust Anomaly Detection for Large-Scale Sensor Data
Submitted by grigby1 on Mon, 07/24/2017 - 1:41pm
Anomaly Detection
belief networks
belief propagation
collaboration
composability
graphical models
Human behavior
Metrics
Policy
pubcrawl
Resiliency
Scalability
sensors
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats