Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber breaches
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
real-time requirements
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
cyber breaches
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
Anomaly Detection
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
security of data
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows