Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
A quantitative and qualitative analysis of tensor decompositions on spatiotemporal data
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pattern detection
Urban areas
tensors
tensor model
tensor decompositions
Tensile stress
Spatiotemporal phenomena
spatiotemporal data analysis
Spatial resolution
quantitative analysis
qualitative analysis
Public transportation
pubcrawl
Anomaly Detection
pattern clustering
Metrics
Matrix decomposition
Indexes
high-dimensional data analysis technique
GPS data
georeferenced data sets
geographic information systems
decomposition
data analysis
convergence
Compositionality
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »