Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Transparent IDS Offloading for Split-Memory Virtual Machines
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
IDS
VMemTrans
VM migration
VM introspection
transparent IDS offloading
split-memory VM
split-memory virtual machines
split migration
remote hosts
offloaded IDS
multiple hosts
large-memory VM
IDS offloading
exchanges memory data
access VM remote memory
security of data
Instruction sets
resilience
virtual machines
Virtual machining
maintenance engineering
Memory management
Runtime
composability
Big Data
Resiliency
pubcrawl
Intrusion Detection Systems
Monitoring
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
IDS
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
NSL-KDD
multiple machine learning algorithms
machine learning algorithms
identifying attacks
ID
detect attack
current IDS
computer safety hazards
complex & increasing tasks
artificial intelligence & machine learning algorithms
anomaly-based IDS
accurate intrusion detection
learning (artificial intelligence)
cyber-attacks
resilience
computer networks
Attack detection
network security
composability
intrusion detection system
Artificial Intelligence
computer network security
Resiliency
pubcrawl
cyber security
security of data
biblio
Assurance levels for decision making in autonomous intelligent systems and their safety
Submitted by grigby1 on Fri, 04/09/2021 - 11:22am
Safety
hypothetical safety limitation
Information Assurance
Metrics
policy-based governance
pubcrawl
pure decision-making capabilities
resilience
Resiliency
Human behavior
safety critical activities
safety monitoring design
safety violations
safety-critical software
Scalability
security of data
system assurance
unavoidable uncertainty
cognitive techniques dependability
assurance level
assurance level definition
autonomous intelligent system
autonomous intelligent systems safety
autonomous system decision making
cognition
cognitive functions
cognitive systems
Artificial Intelligence
collaboration
composability
cyber-physical systems
decision function
Decision Making
decision self-making
environmental information
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
computer networks
Systems engineering education
SEnSE
insider threats detection
insider threat sense
hierarchy-mapping based insider threats model
Fellows
Electronic equipment
active defense model
Systems engineering and theory
detection
model
computer science education
insider threat
Metrics
computer security
Information systems
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
information security
security of data
biblio
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
Resiliency
low-cost technical solutions
insider threat control deployment
insider risk mitigation
high-level categories
insider threat program
risk analysis
Metrics
Law
Software
tools
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
security
Organizations
insider threat
security of data
1
2
3
4
5
6
7
8
9
…
next ›
last »