Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
logs
biblio
DANTE: Predicting Insider Threat using LSTM on system logs
Submitted by aekwall on Mon, 11/08/2021 - 2:22pm
Cancer
CERT dataset
data privacy
information and communication technology
insider threat
logs
LSTM
Measurement
Natural languages
Predictive models
privacy
pubcrawl
Recurrent neural networks
RNN
security
threat vectors
biblio
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring
Submitted by grigby1 on Wed, 05/05/2021 - 11:31am
SCADA
SCADA Systems Security
undesired events
process-related threats
malicious actions
Itemsets
logs
SCADA System Security
power systems
Substations
Monitoring
Compositionality
Data mining
SCADA systems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 2:00pm
HDFS
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
Pipelines
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
Cloud Computing
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
data analysis
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
biblio
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
Submitted by grigby1 on Tue, 10/03/2017 - 10:46am
botnet
botnets
frequency domain
Human behavior
logs
Metrics
mining
proxy
pubcrawl
Resiliency
Scalability
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD