Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayesian network
biblio
Differential Privacy High-dimensional Data Publishing Method Based on Bayesian Network
Submitted by grigby1 on Fri, 06/30/2023 - 3:46pm
composability
maximum information coefficient
high-dimensional data publishing
elastic privacy budget allocation
Bayesian network
Bayes methods
Publishing
differential privacy
Training data
Support vector machines
privacy
Scalability
Correlation
Resiliency
resilience
Human behavior
pubcrawl
biblio
Alarm Correlation Method Using Bayesian Network in Telecommunications Networks
Submitted by grigby1 on Fri, 03/31/2023 - 8:26am
belief networks
Monitoring
pubcrawl
Metrics
Correlation
Topology
information technology
network topology
Telecommunications
Bayes methods
Bayesian network
Alarm Correlation
fault diagnosis
network operation
Root cause analysis
biblio
Prediction and Detection of Cyberattacks using AI Model in Virtualized Wireless Networks
Submitted by grigby1 on Tue, 03/15/2022 - 2:18pm
Predictive models
pubcrawl
Scalability
Data models
Computational modeling
Artificial Intelligence
Communication system security
wireless networks
Numerical models
Bayes methods
Scalable Security
Bayesian network
Detection of cyberattacks
Wireless Virtualization
biblio
Structural Learning Techniques for Bayesian Attack Graphs in Cyber Physical Power Systems
Submitted by aekwall on Mon, 01/10/2022 - 12:50pm
data structures
Time factors
Time complexity
Structural Learning
Resiliency
real-time systems
pubcrawl
Predictive Metrics
power systems
Control Theory
composability
Boolean functions
Bayesian network
bayesian attack graph
Bayes methods
attack graphs
resilience
biblio
Decision Support for Mission-Centric Network Security Management
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
cyber-physical systems
Resiliency
pubcrawl
Bayesian network
belief networks
attack graph
cyber situational awareness
decision support
Mission resilience
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
network traffic
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
IP networks
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
feature dimensionality reduction approach
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
Bayes methods
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
biblio
A Vulnerability Assessment Method of Cyber Physical Power System Considering Power-Grid Infrastructures Failure
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
failure analysis
Power Grid Vulnerability Assessment
vulnerability assessment method
vulnerability assessment
single component function failure
power-grid infrastructures failure
power system reliability
power system faults
Power Grid Network
power components
multiple components synchronization function failure
local CPPS model
information components
functional characteristics
full probability evaluation formula
cyber-physical systems
cyber-physical power system
cyber physical power system
CPPS operation
cooperative attack
communication components
Bayesian network
probability
Metrics
power grids
composability
security
Resiliency
resilience
pubcrawl
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Towards probabilistic identification of zero-day attack paths
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero Day Attacks and Defense
zero-day attack paths
ZePro
sockets
probabilistic identification
object instance graph
intrusion propagation
enterprise network security defense
Bayesian network
belief networks
computer network security
Communication networks
probability
Probabilistic logic
composability
pubcrawl
Resiliency
feature extraction
Bayes methods
security
Conferences
1
2
next ›
last »