Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
ontologies (artificial intelligence)
Taxonomies
OWL
insider threat research
insider threat definitions
insider
definitions
conceptual model
Educational institutions
software engineering
Ontology
taxonomy
insider threat
Ontologies
Metrics
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
software engineering
software installation
Sociotechnical
sabotage
Materials
insider threats indicators
insider threat cases
insider IT sabotage
indicators
Educational institutions
chronological timelines
attack planning
Weapons
insider threat
Metrics
information technology
Databases
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Information-theoretic security in wireless multicasting
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
multicast communication
wireless multicasting
transmission rate
secrecy multicast mutual information
quasistatic Rayleigh fading channel
nonzero secrecy
Multicasting
multicast mutual information
informationtheoretic security
information theoretic formulation
eavesdropper's channel
client receiver
analytical expression
outage probability
information theoretic security
transmitter
security of data
Rayleigh fading
radio receivers
radio transmitters
Rayleigh channels
eavesdropper
probability
Phasor measurement units
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
telecommunication security
Scalability
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
collaborative security
sensitive information
information exchange
security-related information
privacy loss
game-theoretic analysis
information theoretic security
collaboration gain
collaborative entities
Loss measurement
collaborative security schemes
information sharing process
multiple security entities
Quantitative information flow
quantitative information flow game perspective
quantitative information flow games
security-privacy tradeoff
security of data
security decisions
Games
collaboration
Intrusion Detection
cyber-attacks
Metrics
privacy
policy-based governance
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
RNN-VED for Reducing False Positive Alerts in Host-based Anomaly Detection Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
natural language processing
variational encoder-decoder architecture
sequence to sequence
RNN-VED
normal behavior learning
model input-data representation
host-based anomaly detection systems
false positive alerts
ADFALD.
ADFA-LD dataset
Information Reuse and Security
system-call traces
HIDS
anomaly prediction
one-class classification
security of data
host-based intrusion detection systems
Hidden Markov models
Compositionality
Semantics
Recurrent neural networks
recurrent neural nets
Anomaly Detection
data structures
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Classification algorithms
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »