Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 11:14am
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
biblio
"Dynamic defense strategy against advanced persistent threat with insiders"
Submitted by abfox on Tue, 02/14/2017 - 11:01am
game theory
two-layer game model
security of data
pubcrawl170101
Nash Equilibrium
malicious gain
Joints
information-trading game
Games
advanced persistent threat
dynamic defense strategy
defense/attack game
cyber security
Cost function
Computers
computer security
attack process
APT
file
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 2:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 2:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
profile
William Enck
computer security
North Carolina
biblio
Dynamic VM Dependability Monitoring Using Hypervisor Probes
Submitted by amyclay on Mon, 11/16/2015 - 5:12pm
Science of Security
computer security
fault diagnosis
NSA SoS Lablets Materials
Platform virtualization
Reliability
Science of Security
UIUC
Virtual machine monitors
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Dynamic VM Dependability Monitoring Using Hypervisor Probes
Submitted by amyclay on Mon, 11/16/2015 - 5:12pm
Science of Security
computer security
fault diagnosis
Platform virtualization
Reliability
UIUC
Virtual machine monitors
NSA SoS Lablets Materials
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture
biblio
Integrated Anomaly Detection for Cyber Security of the Substations
Submitted by BrandonB on Wed, 05/06/2015 - 1:05pm
simultaneous intrusion detection method
physical security
power engineering computing
Power Grid
power grids
power system reliability
sampled measured value
severe cascading events
simultaneous anomaly detection
network-based anomaly detection systems
SMV
SMV anomaly detection and intrusion detection
substation automation
substation automation testbed
substation facilities
Substations
temporal anomalies
user-interfaces
GOOSE
Anomaly Detection
catastrophic power outages
circuit breakers
computer network security
computer security
cyber intrusions
cyber security of substations
generic object oriented substation event
ADS
GOOSE anomaly detection
host-based anomaly detection systems
IED
integrated anomaly detection system
intelligent electronic devices
Intrusion Detection
malicious behaviors
multicast messages
biblio
Detection of cyber intrusions using network-based multicast messages for substation automation
Submitted by BrandonB on Wed, 05/06/2015 - 12:59pm
sampled value
network security
network-based cyber intrusion detection system
network-based multicast messages
NIDS
packet modification
power engineering computing
predefined security rules
replay
misclassified abnormal packets
SaS
security of data
simultaneous cyber attacks
specification-based algorithm
substation automation
substation automation systems
SV
GOOSE
computer security
cyber security of substations
cyber security testbed
denial-of-service attacks
Educational institutions
false negative ratio
FNR
generic object-oriented substation event
Anomaly Detection
GOOSE and SV
IEC 61850
IEC standards
IEEE 39-bus system model
Intrusion Detection
intrusion detection system
low-fault negative rate
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »