Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
behavioral model
biblio
A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
Metrics
behavioral model
Resiliency
supervised learning
OCSVM
Data integration
Measurement
Policy Based Governance
Computational modeling
resilience
policy-based governance
deep learning
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
Anomaly Detection
Support vector machines
Organizations
machine learning
insider threat
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
Internet of Things devices
UK National Health Service
storage access patterns
static ransomware analysis
prevention systems
machine learning based ransomware detection
live-forensic hypervisor
live ransomware samples
large-scale cyber attacks
dynamic ransomware analysis
dynamic analysis
benign application
behavioral model
Zero-day attacks
invasive software
ransomware attacks
mobile devices
cloud services
machine learning
Metrics
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
support vector machine
Support vector machines