Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
Submitted by grigby1 on Wed, 02/10/2021 - 1:13pm
Peer-to-peer computing
uses Quality
Threat intelligence sharing
reputation system
reputation estimation scheme
Open Cloud testbed
distributed trust
DefenseChain system
DefenseChain implementation
cyber threat intelligence sharing
cloud-hosted applications
blockchain platform
attack mitigation
Cryptography
Cyber Attacks
Attack detection
Cloud Computing
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Distributed databases
blockchain
cyber security
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Problems of Poison: New Paradigms and "Agreed" Competition in the Era of AI-Enabled Cyber Operations
Submitted by aekwall on Mon, 01/11/2021 - 1:39pm
Deterrence
soon-to-be-ubiquitous AI systems
societal systems
Scalability
Resiliency
pubcrawl
Protocols
poisoning attacks
persistent engagement
operational obfuscation
offensive cyber operations
national defense postures
national defense establishments
machine learning
AI Poisoning
defensive mission
Cyber Attacks
cyber activities
cyber
artificial intelligence technologies
Artificial Intelligence
AI-enabled cyber operations
AI-enabled cyber campaigns
AI-augmented cyber defenses
AI cyber operations
AI
Human behavior
biblio
Anomaly Detection for Power Grid Based on Time Series Model
Submitted by grigby1 on Fri, 12/11/2020 - 2:44pm
security
Power Grid
power grids
Power system protection
Protocols
pubcrawl
resilience
Resiliency
Scalability
power engineering computing
Smart Grids
smart power grids
Time Frequency Analysis
time series
Time series analysis
time series model
Time-frequency Analysis
timing relationship
Fourier transform
Anomaly Detection
anomaly detection model
computer network security
Cyber Attacks
cyber security situation
discrete Fourier transform
Discrete Fourier transforms
efficient anomaly detection methods
advanced behavior attacks
highly periodic network
mainstream security devices
Metrics
network message
original physical isolation
periodic extraction method
periodic overlapping mapping
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
cyber-attacks
Stochastic Computing Security
stochastic styles
software technologies
semantic machine
Network Monitoring
information safety measure
digital global community
deterministic styles
destiny attacks
cyber- attacks
Cyber Attacks
cyber-threats
business processes
learning (artificial intelligence)
Computer crime
Data models
Scalability
Safety
Resiliency
resilience
pubcrawl
Monitoring
cyber security
machine learning
Training
security of data
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example
Submitted by grigby1 on Tue, 10/06/2020 - 2:10pm
cyber security
Resiliency
resilience
pubcrawl
load frequency control
Frequency measurement
frequency control
digital systems
Digital Information
cyberattack
cyber-physical systems
cyber threats
control system environment
cyber resilience
cyber physical systems
Cyber Attacks
cyber attack
critical infrastructures
critical infrastructure
CPS resilience
control systems
control system security
control system operation
biblio
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Scalability
Human Factors
IDS approaches
individual detection accuracy increase
Intrusion Detection
multicloud environments
pubcrawl
resilience
Resiliency
higher detection accuracy
security
security of data
single cloud-based intrusion detection system
suspicious intrusions
trust
trustworthy IDS communities
untrusted IDS
computer theory
central agent
centralized architecture
Cloud Computing
cloud systems
Coalitional game theory
collaboration
complex computer systems
computer network security
Bayes methods
Cyber Attacks
Cyber-security
Detectors
f⊘yw⊘rds-Intrusion detection systems
Game Theoretical Model
game theory
Games
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »