Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph model
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
Cascading Machine Learning to Attack Bitcoin Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
decentralized cryptocurrency
Resiliency
resilience
pubcrawl
pattern classification
multiclass classification performance
Metrics
learning (artificial intelligence)
Human behavior
graph model
entities classification
electronic money
digital assets
anonymity
data privacy
Cryptography
composability
cascading machine
cascading classifiers
blockchain
Bitcoin network
bitcoin entity characterization
bitcoin blockchain data
bitcoin anonymity
Bitcoin analysis
biblio
Semi-Supervised Change Detection Based on Graphs with Generative Adversarial Networks
Submitted by grigby1 on Fri, 06/12/2020 - 12:21pm
learning (artificial intelligence)
unlabeled nodes
Training
Task Analysis
semisupervised remote sensing change detection method
Semisupervised learning
semisupervised change detection
semi-supervised learning
Scalability
Resiliency
resilience
remote sensing
pubcrawl
multitemporal remote sensing change detection problem
Metrics
binary change map
labeled nodes
image classification
high resolution remote
graph model
geophysical signal processing
geophysical image processing
Generators
generative adversarial networks
generative adversarial network
Generative Adversarial Learning
GANs
Gallium nitride
Change detection
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
A Graph Model for Enhancing Situational Awareness in Power Systems
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Regression tree analysis
power grid operation
power grid security assessment
power grid vulnerability analysis
power grids
power system
power system faults
power system reliability
power system security
power transmission lines
power transmission reliability
pubcrawl
power flow information
Resiliency
security
Security analysis
security issues
situational awareness
system operator
system threats estimation
system threats visualization
Transmission line measurements
visualization
vulnerable links
Indexes
blackout threats
cascading outages
composability
contingency selection
critical links
Decision Making
graph model
graph theory
IEEE 118-bus systems
IEEE 30-bus systems
immediate threats graph
blackout
ITG
LCI
LDG
Line Criticality Index
line dependency graph
line outage impact prediction
Line Vulnerability Index
Load flow
LVI
Metrics
online visualization
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing