Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

dimensional reduction

biblio

Visible to the public EagleEye: A Novel Visual Anomaly Detection Method

Submitted by aekwall on Mon, 10/12/2020 - 11:44am
  • Anomaly Visualization
  • Human Behavior and Cybersecurity
  • visual anomaly detection method
  • two-dimensional space
  • System Call Trace
  • system call
  • modified t-SNE
  • human eyes
  • EagleEyes efficiency
  • EagleEye view
  • dimensionality reduction
  • dimensional reduction
  • data depth
  • Australian Defence Force Academy Linux Dataset
  • Intrusion Detection
  • Human behavior
  • normal behaviors
  • abnormal behaviors
  • Two dimensional displays
  • Three-dimensional displays
  • data visualisation
  • principal component analysis
  • Data visualization
  • Mathematical model
  • pubcrawl
  • Linux
  • security of data
biblio

Visible to the public A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data

Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
  • learning (artificial intelligence)
  • telecommunication traffic
  • Support vector machines
  • Security Heuristics
  • Scalability
  • Resiliency
  • pubcrawl
  • pattern classification
  • network traffic data
  • network systems
  • network intrusion detection
  • machine-learning techniques
  • machine learning
  • least weighted attributes
  • Cloud Computing
  • Intrusion Detection
  • heuristic attack detection approach
  • Feature Selection
  • feature extraction
  • Entropy
  • dimensionality problem
  • dimensional reduction
  • Data mining
  • cyber security data
  • cyber security
  • computer network security
  • Computational modeling
  • cloud-based computer networks

Terms of Use  |  ©2023. CPS-VO