Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network information
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Network Intrusion Detection Mechanisms Using Outlier Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
Intrusion Detection Subsystem
extensive network databases
Forestry
framework conduct
human blunder
information control
information mining
instrument mistake
intrusion
accessible information
network clients
network database framework
network intrusion
network intrusion detection mechanisms
network operations
network route
outlier detection
network intrusion detection
security of data
computer network security
authorisation
Conferences
Resiliency
pubcrawl
composability
Metrics
security
Databases
Vegetation
Data mining
Intrusion Detection
database management systems
XML
network information
biblio
Towards a Conversational Agent for Threat Detection in the Internet of Things
Submitted by aekwall on Mon, 12/16/2019 - 2:28pm
Internet of Things
Virtual Assistant
user speech
threat detection
telecommunication traffic
situational awareness
Scalability
pubcrawl
network traffic
network information
Metrics
invasive software
Intrusion Detection
conversational agents
Human behavior
DynamoDB Table
DDoS
conversational agent
conversation agents
consumer IoT networks
computer network security
Cloud Computing
botnet
anomalous traffic
Amazon Echo
Alexa
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism