Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

exemplar Web-based applications

biblio

Visible to the public A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks

Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
  • Scalability
  • normal application behavior
  • off-line models
  • on-line models
  • perturbed applications
  • program transformation
  • pubcrawl
  • QoS requirements
  • quality-of-service requirements
  • Resiliency
  • Runtime
  • Monitoring
  • security
  • security of data
  • Software
  • software development process
  • software vulnerabilities
  • supervised training
  • Trusted Computing
  • trusted software application
  • unsafe actions
  • web applications
  • features extraction
  • application-agnostic cyber-attack detection system
  • Attack vectors
  • attacker
  • autonomic alert system
  • autonomic cyber-attack detection system
  • Autonomic Security
  • call graph
  • control flow
  • exemplar Web-based applications
  • feature extraction
  • application execution
  • heterogeneous software systems
  • in-process cyber-attacks
  • Instruments
  • Java
  • learning (artificial intelligence)
  • learning strategies
  • lightweight structures
  • machine learning techniques
  • Metrics

Terms of Use  |  ©2023. CPS-VO