Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

internal attackers compromise

biblio

Visible to the public Cloud Insider Attack Detection Using Machine Learning

Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
  • security
  • machine learning
  • machine learning approaches
  • malicious node
  • misbehaving node
  • Monitoring
  • privacy
  • pubcrawl
  • resilience
  • Resiliency
  • Long short-term memory
  • security approaches
  • security of data
  • short-term behavioral data
  • trusted users
  • User behavior
  • valuable information
  • vulnerable information
  • vulnerable user node
  • compromised node
  • anomaly node
  • attackers
  • broken node
  • Cloud Computing
  • cloud insider attack detection
  • cloud network
  • cloud security issues
  • cloud user
  • composability
  • Anomaly Detection
  • Data models
  • data sources
  • deep learning
  • improvised long short-term memory model
  • internal attacker
  • internal attackers compromise
  • learning (artificial intelligence)
  • Logic gates

Terms of Use  |  ©2023. CPS-VO