Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security tools
biblio
AI & ML Based Anamoly Detection and Response Using Ember Dataset
Submitted by aekwall on Thu, 07/14/2022 - 3:21pm
Ransomware
Threat Detection &response
security tools
EMBER
Cyber Security Analytics
pubcrawl
Anomaly Detection
Market research
cyber security
security
composability
Resiliency
Metrics
feature extraction
machine learning
tools
Training
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
Variational Encoder-Decoder Recurrent Neural Network (VED-RNN) for Anomaly Prediction in a Host Environment
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Hidden Markov models
Information Reuse and Security
VED-RNN
variational encoder-decoder recurrent neural network
System-calls
system-call traces
sequence to sequence model
sequence to sequence
security tools
prediction model input data representation
HIDS
anomaly prediction
one-class classification
NIDS
security of data
Compositionality
Intrusion Detection Systems
Recurrent neural networks
recurrent neural nets
Predictive models
Anomaly Detection
Prediction algorithms
pattern classification
Decoding
pubcrawl
Resiliency
Classification algorithms
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Secure Cloud Storage and File Sharing
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
secure file sharing mechanism
online cloud services
pubcrawl
re-encryption
resilience
Resiliency
seamless file sharing technique
secure cloud storage
secure data-storage services
Secure File Sharing
native machines
security
security failure rates
security risks
security tools
Servers
sophisticated techniques
storage management
storage necessities
storage space
data maintenance
Cloud Computing
cloud service provider
cloud storage service providers
complex techniques
composability
computing resources
confidentiality
Cryptography
data integrity
Access Control
DIP
disintegration protocol
elastic data-storage services
encryption
encryption key
enormous volumes
Fingerprint recognition
Human behavior
Metrics
file
Trusted Computing in 2025?
Submitted by WarrenAHuntJr on Tue, 05/20/2014 - 2:19pm. Contributor:
Warren A. Hunt, Jr.
Session 4
risk analysis
modeling
security tools
Hardware
Software
The University of Texas at Austin
Cyber2025
2014
Session 4
Academia
Presentation
file
Social Influences on Secure Development Tool Adoption: Why Security Tools Spread
Submitted by emerson on Fri, 11/01/2013 - 11:05am. Contributors:
Emerson Murphy-Hill
Jim Witschey
Shundan Xiao
Concurrency and Timing
Science of Security
secure software tools
secure tool
security tools
social influence
tool adoption
web development
Academia
Presentation
SoS Quarterly Lablet Meeting, Sept '13 at CMU
NCSU
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials