Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data collection
biblio
A Practical Evaluation of Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke time series
time series
time 5 min
time 30 min
time 2.5 min
time 10 min
time 1 min
temporal data order
sliding window
sessions
pubcrawl
Metrics
Measurement
Human behavior
keystroke analysis
Keyboards
integrated circuits
Human Factors
authentication
behavioral biometric
biometrics (access control)
continuous user authentication
Data collection
free-text keystroke dynamics
Heuristic algorithms
biblio
A user-centric machine learning framework for cyber security operations center
Submitted by K_Hooper on Wed, 02/14/2018 - 12:00pm
Scalability
Mathematical model
Metrics
model performance evaluations
Predictive models
preventive technologies
pubcrawl
Resiliency
risk score generation
risky user detection
malicious attacks
security event normalization
security information and event management system
security of data
SIEM
SOC analyst productivity
Symantec SOC production environment
user-centric
user-centric machine learning framework
flag alerts
computer security
cyber security operation center
cyber security operations center
cyber security practitioners
Data collection
Data models
data scientists
false positive rate reduction
feature engineering
artificial intelligence security
Human behavior
label creation
learning (artificial intelligence)
Learning systems
machine learning algorithm selection
machine learning algorithms
machine learning researchers
machine learning system
biblio
Measuring Personality for Automatic Elicitation of Privacy Preferences
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
personality trait
web applications
user privacy preferences
user personality traits
user connectivity
Scalability
Resiliency
pubcrawl
psychology
privacy protection
privacy preference
privacy
Policy
big data privacy
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
intelligent privacy management systems
Human Factors
Electronic mail
data privacy
Data collection
cultural differences
computer science
Big-Five personality traits
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
Secure Data Collection in Spatially Clustered Wireless Sensor Networks
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
Data collection
sensor security
wireless sensor networks
Wireless Sensor Network
node compromise
Correlation
Clustering algorithms
cluster
Monitoring
security
sensors
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Energy
Metrics
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
Mining the Dark Web: Drugs and Fake Ids
Submitted by grigby1 on Fri, 11/03/2017 - 11:28am
data wrangling
Web sites
Weapons
Tor
The Silk Road
Roads
nonstandard communication protocols
law administration
internet
illegal item marketplace
governmental bodies
FBI
fake ids
Europol
etl processing
drugs
security
Data mining
Data collection
dark Web mining
dark Web marketplaces
dark web
counterfeit documents
bitcoins
authomation
Agora
security of data
cryptocurrencies
Human Factors
Human behavior
pubcrawl
biblio
ADaCS: A Tool for Analysing Data Collection Strategies
Submitted by thurlwel on Tue, 10/24/2017 - 5:07pm
Science of Security
attack trees
Data collection
experiment design
risk management
Science of Security
Security modeling
UIUC
UIUC
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »