Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive systems
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search
Submitted by grigby1 on Tue, 01/21/2020 - 11:25am
learning rate
two-dimensional grid
Training
threat detection rate
security of data
search problems
Resiliency
resilience
pubcrawl
policy-based governance
optimization parameters
Optimization methods
one-dimensional parameter optimization
network structure
Metrics
insider threat
learning (artificial intelligence)
insider threat detection method
Human behavior
grid search
deep learning model
deep learning
deep belief net
composability
collaboration
belief networks
adaptive systems
adaptive optimization DBN
adaptive optimization
Adaptation models
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
recommender systems
unified framework
Trusted Computing
trust-aware recommender systems
trust relationships
trust directions
sparse users
Social network services
security of data
Scalability
Resiliency
resilience
Adaptation models
recommendation quality
pubcrawl
Mathematical model
learning (artificial intelligence)
learn directive trust strength
Human Factors
Data models
Computational modeling
cold start
adaptive systems
adaptive method
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
biblio
Adaptive Root Cause Analysis for Self-Healing in 5G Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
return on investment
network data
network experts
pattern classification
probabilistic Bayesian classifier
probability combinations
probable root cause
pubcrawl
quality of service
RCA process
resilience
Resiliency
Manuals
ROI
Root cause analysis
self-healing
self-healing networks
self-organising feature maps
self-organizing network
SH
SON based solutions
stratified synthesized data
telecommunication computing
Cellular networks
5G mobile communication
5G networks
adaptive learning
adaptive root cause analysis
adaptive systems
ARCA
automated evidence based RCA
automated fault detection
Bayes methods
Bayesian network theory
belief networks
5G
composability
domain knowledge reuse
fault detection
fault diagnosis
fault tolerant computing
Incomplete Data
learning (artificial intelligence)
Long Term Evolution
LTE Advanced
LTE-A
biblio
Adaptive consistency for distributed SDN controllers
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software-defined networking
software defined networking
Servers
Scalability
Resilient Security Architectures
Resiliency
pubcrawl
Load modeling
distributed SDN controllers
distributed load-balancing application
Distributed databases
control systems
adaptive systems
adaptive consistency model
Adaptation models
biblio
Design Framework for Reliable Multiple Autonomic Loops in Smart Environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
middleware
transactional middleware LINC
transactional execution mechanism
Switches
Smart Environments
sensors
self-adjusting systems
Scalability
Resiliency
reliable self-adaptive systems
reliable multiple autonomic loops
Reliability engineering
Reliability
reactive language Heptagon/BZR
pubcrawl
Multiple loops
abstraction framework PUTUTU
Metrics
Mathematical model
loops composition
loops adaptation
control systems
control engineering computing
building management systems
Building automation
Autonomic Security
automata-based controller
automata theory
adaptive systems
actuators
Abstraction Layer
biblio
An Ontological Approach to Digital Storytelling
Submitted by grigby1 on Thu, 05/18/2017 - 2:20pm
adaptive systems
Digital Storytelling
Human behavior
Kerberos
Metrics
Mobile Applications
Ontologies
pubcrawl
Resiliency
social networks
biblio
Ensemble of Adaptive Algorithms for Keystroke Dynamics
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
data streams
Training
Stacking
pubcrawl170115
message authentication
machine learning
learning (artificial intelligence)
keystroke dynamics
Ensemble
Adaptation models
biometrics (access control)
biometric system authentication
Biological system modeling
authorisation
adaptive systems
adaptive biometric systems
adaptive algorithm
« first
‹ previous
1
2
3
4
5
6
next ›
last »