Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Anomaly Detection
biblio
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
Anomaly Detection
Peer-to-peer computing
pubcrawl
Human behavior
Conferences
Scalability
network security
bitcoin
cryptocurrency
P2P network
Connection Manipulation
eclipse
bitcoin security
biblio
Anomaly Detection on Bitcoin Values
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
tools
deep learning
Predictive models
Anomaly Detection
pubcrawl
Human behavior
Scalability
Data models
Big Data
bitcoin
data analysis
LSTM
Recurrent neural networks
bitcoin security
biblio
Unsupervised Anomaly Detection in Data Quality Control
Submitted by grigby1 on Fri, 06/10/2022 - 1:49pm
Organizations
Unsupervised Learning
Anomaly Detection
pubcrawl
Scalability
Data models
process control
Big Data
Decision Making
data integrity
human in the loop
automated data quality control
data quality assessment
data quality control
Quality Control
biblio
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
Recurrent neural networks
insider threat
data science
attention mechanism
Cyberspace
Metrics
Data mining
composability
History
Organizations
Conferences
policy-based governance
Human behavior
pubcrawl
Neural networks
Insider Threat Detection
Anomaly Detection
biblio
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
deep learning
insider threat
Neural networks
Anomaly Detection
pubcrawl
Human behavior
policy-based governance
network security
performance evaluation
Data models
privacy
Planning
composability
Metrics
Costs
biblio
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
composability
data augmentation
generative adversarial networks
generative adversarial network
visualization
Adversarial training
Measurement
Metrics
Benchmark testing
insider threat
privacy
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
security
Organizations
biblio
Insider Threat Detection Using An Unsupervised Learning Method: COPOD
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
Human behavior
tree structure analysis
insider threat
Vegetation
Metrics
composability
Companies
Communication networks
policy-based governance
feature extraction
pubcrawl
Intrusion Detection
Insider Threat Detection
Anomaly Detection
Unsupervised Learning
Forestry
security
biblio
GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
Filtering
multi-head attention
multi-autoencoder
GRU
data science
Cyberspace
Measurement
Metrics
composability
Logic gates
Correlation
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Forestry
insider threat
biblio
A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system
Submitted by grigby1 on Mon, 06/06/2022 - 12:57pm
information security
machine learning
security
Anomaly Detection
pubcrawl
Analytical models
Scalability
Data models
privacy
Medical services
Human Factors
visualisation
human in the loop
Electronic Patient Records
Healthcare Infrastructures
patient privacy
biblio
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay
Submitted by aekwall on Thu, 05/19/2022 - 1:38pm
Servers
Anomaly Detection
pubcrawl
Metrics
composability
Semantics
Runtime
Memory management
taint analysis
application logic vulnerabilities
decoupled dynamic information flow tracking
Runtime library
static information flow tracking
taint propagation
target tracking
1
2
3
4
5
6
7
8
9
…
next ›
last »