Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by Katie Dey on Sun, 09/30/2018 - 12:22pm
Hardware
physical system
actuation capability
cyber physical systems
Software
Computational modeling
Analytical models
computer architecture
computer security
physical components
hardware-in-the-loop
Model Integrated Computing
vulnerability assessment
resilience
cyber-physical system
Experimentation
testbed
HIL testbed
embedded systems
hardware-in-the loop simulation
security of data
software engineering
cyber-attack effect evaluation
hardware-in-the-loop simulation testbed
embedded computers
system functions
cyber-physical systems
simulation environment
cybersecurity design process
platform specific performance measurements
railway transportation system
CPS attack experiments
model based software development framework
cyber components
biblio
Empirical study of the impact of e-government services on cybersecurity development
Submitted by grigby1 on Fri, 09/28/2018 - 4:04pm
Electronic government
security of data
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
Online service index
Indexes
Human behavior
government data processing
global cybersecurity development index
2015 International Telecommunication Union
e-government services
e-government development index
E-government development
E-Government
Cybersecurity development
Cybersecurity
cyber-security policy
Correlation
computer security
Communications technology
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 1:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Security Analysis of Online Centroid Anomaly Detection
Submitted by grigby1 on Fri, 07/06/2018 - 2:07pm
adversarial
AI Poisoning
Anomaly Detection
computer security
Human behavior
network intrusion detection
pubcrawl
resilience
Resiliency
Scalability
Security analysis
support vector data description
biblio
Poisoning Behavioral Malware Clustering
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
Human behavior
Unsupervised Learning
clustering
Scalability
computer security
malware detection
resilience
Security Evaluation
Resiliency
Adversarial Machine Learning
AI Poisoning
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms
biblio
Hierarchical learning for automated malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
pubcrawl
machine learning solutions
malicious file detection
malicious files automated classification
malware
malware classification
malware label
Metrics
nonhierarchical classifier
pattern classification
privacy
machine learning algorithms
resilience
Resiliency
security domain
signature augmentation
Support vector machines
system monitoring
Training
Win32
Win64
Formal Specification
automated malware classification
binary error rate
classification models
commercial anti-virus products
Companies
computer security
computer viruses
corporate computers
family variant
feature extraction
anti-virus companies
hierarchical labels
hierarchical learning algorithms
Hierarchical Machine Learning
hierarchical structure
home computers
Human behavior
industrial-scale malware dataset
label hierarchy achieves
learning (artificial intelligence)
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »