Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security data
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Active Tamper Detection Circuit Based on the Analysis of Pulse Response in Conductive Mesh
Submitted by grigby1 on Wed, 04/11/2018 - 2:53pm
Metrics
Time Frequency Analysis
Shape
security modules
security data
security
Scalability
Resiliency
resilience
pulse response
pubcrawl
passive networks
passive circuits
microcontrollers
active networks
Mesh networks
low power consumption
intrusion attempt detection
frequency-domain analysis
frequency domain characterization
foil
electronic modules
detector circuits
delays
cyber physical systems
conductive mesh
Clocks
active tamper detection circuit