Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Assessment of System Vulnerability for Smart Grid Applications
Submitted by grigby1 on Mon, 11/27/2017 - 12:24pm
Resiliency
PCA
power engineering computing
power grid vulnerability analysis
power system blackout
Power system dynamics
power system reliability
power system stability
power system transient stability
principal component analysis
pubcrawl
Pattern recognition
security
smart grid applications
Smart Grids
smart power grids
Spectral analysis
SVM
SVM-C
system vulnerability assessment
TSA
Voltage measurement
electrical grid
composability
data analysis
data classification
Data mining
data mining tools
digital system
duplex communication
DVA
dynamic vulnerability assessment
electric signals
automation system
ICT
IEEE 57 bus
learning (artificial intelligence)
machine learning
machine learning tool
Metrics
MSSA
multichannel singular spectrum analysis
pattern classification
biblio
Network security intrusion detection system based on incremental improved convolutional neural network model
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
intrusion behavior testing
system detection
security of data
Resiliency
pubcrawl
pretreatment
policy-based governance
Policy
Neurons
neural network
neural nets
network security
intrusion detection system
Intrusion Detection
artificial neural network
intrusion behavior detection
Government
Governance
feature extraction
detecting system
data analysis
data acquisition
convolutional neural network
convolution
Computers
Communication networks
collaboration
Artificial Neural Networks
biblio
Algorithmic Stability for Adaptive Data Analysis
Submitted by grigby1 on Tue, 10/10/2017 - 10:44am
Adaptivity
Computing Theory and Privacy
data analysis
differential privacy
Generalization
Human behavior
pubcrawl
Resiliency
Scalability
stability
Statistics
biblio
Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model
Submitted by grigby1 on Wed, 03/29/2017 - 12:33pm
pubcrawl
neural network
Neural networks
neural networks security
photovoltaic rooftop power plant data
policy-based governance
power system security
power system stability
Production
neural nets
Resiliency
security of data
Smart Grid
Smart Grids
smart power grids
Voltage control
voltage distribution
Data models
artificial neural network model
Context
Context modeling
contextual anomaly detection method
cyber-physical security
cyber-physical systems
cyberphysical security
data analysis
Anomaly Detection
Density estimation robust algorithm
distributed energy resource behaviour
energy resources
intrusion detection system
low voltage distribution grid
malicious voltage control actions
Metrics
biblio
Challenges of Cloud Computing amp; Big Data Analytics
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
AaaS
Big Data
Big Data Analytics
Cloud Computing
data analysis
Distributed databases
File systems
Hadoop
HDFS
Honey Pot Nodes
manufacturing
Map Reduce
Organizations
pubcrawl170114
security
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
DC scanner: Detecting phishing attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
hypermedia markup languages
who is command
Web pages
visualization
URL verification
Servers
Script scanning
script codes
pubcrawl170109
phishing attack probability
internet
Computer crime
HTML contents
Electronic mail
e-mail based phishing attack detection
domain related authority details
domain name
DC scanner
Data mining
data analysis
cyber-attacks
Content analysis
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »