Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
heavily obfuscated code
Web sites
under-the-hood practices
stealthy mining operations
Resiliency
resilience
pubcrawl
parasitic miners
online front-ends
mining prevention plug-ins
mining code
Metrics
learning (artificial intelligence)
Human Factors
Human behavior
browser code
hardware-assisted profiling
Hardware
exploitative exercise
Data mining
cryptojacking
Cryptography
cryptocurrency market
cryptocurrency
covert mining operations
countering cryptojacking
Computer hacking
Browsers
browser extension
browser cryptojacking
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
PRETSA
sensitive information
security of data
Scalability
Resiliency
resilience
pubcrawl
pseudonymized employee information
process model discovery
process execution
process discovery
privacy-disclosure attacks
Privacy-aware Process Mining
privacy-aware process discovery
privacy guarantees
privacy
Analytical models
Personnel
performance-annotated process model
Information systems
Human Factors
Human behavior
event log sanitization
event data
differential privacy
Data Sanitization
data privacy
Data mining
data deletion
Compositionality
business data processing
Business
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
real-time requirements
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
cyber breaches
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
Anomaly Detection
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
security of data
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
biblio
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
outlier error values
highly structured adjacency matrix structures
increasing sparseness
learning (artificial intelligence)
Matrix decomposition
Metrics
network based attacks
network emulator
network security
network traffic
online learning algorithm
original adjacency matrix
Heuristic algorithms
pubcrawl
representative ecommerce traffic
Resiliency
resultant adjacency matrix
serious economic consequences
singular value decomposition
sparse autoencoder
Sparse matrices
telecommunication traffic
time 225.0 min
decomposition
autoencoder hyper-parameters
Bipartite graph
composability
Compositionality
Computer crime
computer network security
contiguous time intervals
cyber physical systems
Data mining
DDoS Attacks
anomaly detection algorithm
dynamic bipartite graph increments
dynamic graph
dynamic graph mining
dynamic network traffic
Dynamic Networks and Security
ecommerce websites
error distribution
GAAD
gaussian distribution
graph theory
biblio
PMU Based Data Driven Approach For Online Dynamic Security Assessment in Power Systems
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
real time synchronized measurements
power engineering computing
power system
power system control
Power system dynamics
power system security
power system stability
power system transient stability
pubcrawl
Random Forest
PMU based data driven approach
real-time systems
security
synchronized phasor measurements
system control
system operator
system pertaining
transient instability
wide-area dynamic security assessment
Decision Tree
Intelligent Data Security
Compositionality
Resiliency
Scalability
composability
cyber-physical systems
Data mining
data mining model
Data models
Intelligent Data and Security
Dynamic security assessment
IEEE 39 bus system
intelligent framework based approach
measurement data
Metrics
online dynamic security assessment
phasor measurement
Phasor measurement units
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Predictive Metrics
Zero-Determinant strategy
ZD player
ZD adopter
open mining pools
mutual attacks
macroscopic utility
game theoretic analysis
conventional game theory
block withholding attacks
block withholding attack
Bitcoin's incentive system
game theoretic security
security of data
Human Factors
Games
security threats
delays
distributed system
Data mining
blockchain
bitcoin
pubcrawl
game theory
Scalability
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 12:03pm
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »