Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
ACT Testbot and 4S Quality Metrics in XAAS Framework
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
software prototyping
metrics reports
program debugging
program testing
pubcrawl
regression testing
security
Security Metrics
security of data
security testing
service models
Software as a service
software metrics
software product
metrics dashboard
software quality
Software Testing
T-Model
test management tools
TestBot
testing
testing as a service
Testing process
testing tools
tools
XaaS (Everything as a Service)
XAAS framework
cloud
metrics testing
4S quality metrics
ACT TestBot tool
agile environment
agile methodology
Auto Bug Logging and Tracking
automated continuous testing
Automatic testing
automation scripts
big data security metrics
bug logging
bug reporting tools
Measurement
cloud based service models
Cloud Computing
Computer bugs
Continuous Delivery
continuous deployment
Continuous Integration
continuous integration tools
Continuous Testing
data analysis
data analytics tools
Measurement and Metrics Texting
Metrics
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
lower-than-IP-layer partitioning mechanisms
computer center
container
Dentistry
dynamic reconfigurability
Dynamic scheduling
Ethernet
field trial system
high performance data analytics
highly confidential data
common vulnerability scoring system evaluation
PCI Express
Provisioning Partitioning
reconfigurable computing platform
secure data
secure staging system
Security Scheduling
software defined
Ubiquitous Computing Security
computer security
computer network security
Cloud Computing
Scalability
Software
Resiliency
pubcrawl
Metrics
resource allocation
security of data
data analysis
Containers
OpenFlow
Human Factors
Reconfigurability
High performance computing
hospitals
reconfigurable architectures
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Text Mining
social networking site Twitter.com
social networking (online)
social media data mining
social media
situational awareness
sentiment analysis
security relevant information retrieval
security of data
Resiliency
resilience
Ransomware
pubcrawl
Metrics
composability
internet
information retrieval
Data mining
data analytics techniques
data analysis
data aggregation
cybersecurity tweet dataset
Cybersecurity
cyberattack
cyber threat landscape
cyber situational awareness information
cyber situational awareness
cyber risk
Cyber Attacks
biblio
Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System
Submitted by grigby1 on Mon, 02/17/2020 - 5:13pm
power distribution control
smart power service
Smart Grids
SHC
self-healing technology
self-healing networks
self-healing control
Resiliency
resilience
Real-time monitoring
pubcrawl
power system security
power system
power grids
power engineering computing
power distribution faults
Business
optimal control
Monitoring
maintenance engineering
intelligent power communication network
intelligent distribution network communication system faults
intelligent decision
distribution network self-healing control
distribution network data monitoring
Data Transmission
data analysis
computerised monitoring
composability
Communication networks
Circuit faults
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
The Security Evaluation of Big Data Research for Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
privacy
technological development
smart power grids
Smart Grids
smart grid system
smart grid security
smart grid attacks
security
Scalability
Resiliency
Reliability
pubcrawl
big data security metrics
power system security
power engineering computing
Metrics
machine learning
data analysis
Classification algorithms
big data technologies
Big Data research
Big Data method
Big Data Analytics
Big Data
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »