Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
User profile
biblio
Personalized User Profiles-based Insider Threat Detection for Distributed File System
Submitted by grigby1 on Fri, 07/21/2023 - 2:16pm
Data Security
User profile
distributed file system
false trust
Resiliency
HDFS
File systems
Clustering algorithms
resilience
Measurement
Insider Threat Detection
estimation
Industries
authorization
Scalability
collaboration
policy-based governance
pubcrawl
machine learning
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
Human behavior
User profile
user identity
transaction verification
transaction processing
transaction management
trading
security issues
security
Scalability
pubcrawl
pseudonames
peer-to-peer payment network
Peer-to-peer computing
market
adversarial attacks
exchange trading commodity
exchange
digital currency
data privacy
cryptocurrency
cryptocurrencies
crypto-currency
blockchain
Bitcoin system
Bitcoin privacy
bitcoin
assets
Anonymity and Privacy
biblio
Observation Measures to Profile User Security Behaviour
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Data collection
Human Behavior and Cybersecurity
user-system interactions
user security behaviour
User profile
user modelling
security behaviour profile
Observation Measures
interactive environment
cybersecurity threats
computer user security
behaviour profiling
Behaviour Profile
Human behavior
human computer interaction
computer security
pubcrawl
security of data
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control