Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

graphical analysis

biblio

Visible to the public Automated Event Prioritization for Security Operation Center using Deep Learning

Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
  • automation
  • SOC workflow
  • SOC event classification
  • Security Operation Center
  • graphical analysis
  • event classification
  • deep neural network model
  • cybersecurity clearinghouse
  • critical security events
  • automated event prioritization
  • SIEM
  • Incident Response
  • security data
  • encoding
  • security event
  • Automated Response Actions
  • security of data
  • internet
  • pattern classification
  • neural nets
  • graph theory
  • deep learning
  • composability
  • pubcrawl
  • Resiliency
  • learning (artificial intelligence)
  • feature extraction
  • Data models
  • Task Analysis
  • security
  • IP networks
  • IDS
biblio

Visible to the public Studying cyber security threats to web platforms using attack tree diagrams

Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
  • information technology
  • WordPress vulnerabilities
  • WordPress platform
  • Web platforms
  • Web platform
  • trees (mathematics)
  • security threats
  • security personnel
  • security of data
  • Scalability
  • Resiliency
  • pubcrawl
  • Organizations
  • Open Source Software
  • Metrics
  • internet
  • artificial intelligence security
  • information systems designers
  • Information systems
  • Human behavior
  • graphical analysis
  • global reference system
  • cyber-attack
  • cyber security threats
  • Computers
  • computer system
  • computer security threats
  • computer security
  • common vulnerabilities
  • Attack Tree method
  • attack tree diagrams
  • attack tree

Terms of Use  |  ©2023. CPS-VO