Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph mining
biblio
Discriminative Pattern Mining for Runtime Security Enforcement of Cyber-Physical Point-of-Care Medical Technology
Submitted by grigby1 on Tue, 03/22/2022 - 12:44pm
security
cyber-physical systems
pubcrawl
resilience
Resiliency
Software
Runtime
graph mining
Electrodes
Reliability engineering
Digital Microfluidics
Infectious diseases
information flow security
Point of care
point-of-care diagnostics
System recovery
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Training
feature extraction
machine learning
Forestry
Support vector machines
pubcrawl
security
Kernel
Metrics
graph mining
search engines
web spam
webgraphs
predictive security metrics
biblio
Adversarial Attacks on Neural Networks for Graph Data
Submitted by grigby1 on Fri, 02/08/2019 - 3:30pm
resilience
pubcrawl
Metrics
Resiliency
composability
Adversarial Machine Learning
attack graphs
graph convolutional networks
graph mining
network mining
semi-supervised learning
biblio
Maintaining Densest Subsets Efficiently in Evolving Hypergraphs
Submitted by grigby1 on Wed, 09/12/2018 - 10:18am
data deletion
densest subgraph
dynamic data structure
graph mining
privacy
pubcrawl
Scalability
biblio
DNS graph mining for malicious domain detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
multiple malicious domains
IP resolutions
labeled domains
malicious domain detection technique
malicious probabilities
Malware Analysis
malware detection
Markov processes
message passing
Metrics
IP networks
Nickel
potential malicious domains
privacy
probability
pubcrawl
resilience
Resiliency
variety cyber attacks
graph mining
belief propagation
belief propagation algorithm
computer network security
cyber security
Data mining
DNS data servers
DNS graph mining
Domain Resolution
Graph Interface
attackers
graph mining task
graph node
graph theory
graph-based interface
Human behavior
Inference algorithms
internet
invasive software
biblio
Insider Threat Event Detection in User-System Interactions
Submitted by grigby1 on Wed, 05/30/2018 - 2:57pm
Anomaly Detection
Bipartite graph
community structure
graph mining
Human behavior
Human Factors
ibm rational clearcase
insider threat
Metrics
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
biblio
Mining Attributed Graphs for Threat Intelligence
Submitted by grigby1 on Wed, 04/11/2018 - 1:46pm
advanced persistent threat
graph mining
Human behavior
information retrieval
Metrics
pubcrawl
resilience
Resiliency
threat intelligence
threat mitigation
biblio
Cross-Dependency Inference in Multi-Layered Networks: A Collaborative Filtering Perspective
Submitted by grigby1 on Wed, 01/10/2018 - 11:24am
composability
Cross Layer Security
cross-layer dependency
graph mining
Multi-layered network
pubcrawl
Resiliency
1
2
next ›
last »