Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
time series
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
Metrics
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
message transmission
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
information scanning
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
Cryptography
Receivers
Resiliency
pubcrawl
composability
internet
network security
Predictive Metrics
chaos
chaotic communication
chaotic cryptography
8-bit ASCII code
adaptive signal processing
bandwidth allocation
chaos-based cryptography
chaotic nonautonomous Duffing oscillator
Communication channels
crypto-analysis methods
Encryption technique
Lyapunov methods
Lyapunov-based adaptive technique
Multimedia communication
multimedia data
multimedia signals
multiple chaotic orbits
Oscillators
public communication channel
telecommunication channels
time series
Transmitters
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by
grigby1
on Tue, 11/12/2019 - 3:26pm
aggregation granularity
ARIMA
auto-regressive integrated moving average models
autoregressive moving average processes
Bayesian networks
belief networks
binary occurrence metrics
Computer crime
computer network security
Correlation
cyber attack occurrences
cyber defense
forecasting
incident count forecasting
intrusion detection methods
malicious activity
Malicious Traffic
malware
Metrics
potential external factors
Predictive models
predictive security metrics
pubcrawl
security
target configuration
time series
Time series analysis
time series construction
Uniform resource locators
biblio
Abnormal Item Detection Based on Time Window Merging for Recommender Systems
Submitted by
grigby1
on Tue, 10/15/2019 - 1:41pm
abnormal item detection
abnormal item detection method
ATIAR
average time interval of abnormal rating
Big Data
CFRS
collaborative filtering
collaborative filtering recommendation system
computational cost
Conferences
DAR
data privacy
deviation of time interval of abnormal rating
distribution characteristics
DTIAR
false user profile recognition
Handheld computers
high detection rate
Human Factors
low false alarm rate
MovieLens
object detection
partition rating time series
pubcrawl
rating distribution characteristics RAR
ratio of abnormal rating
recommender systems
resilience
Resiliency
Scalability
security
security of data
shilling attacks
suspicious intervals
time overhead
time series
time window merging
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by
grigby1
on Fri, 04/05/2019 - 9:27am
security of data
resilience
pubcrawl
Human behavior
Metrics
Training
Browsers
computer architecture
Recurrent neural networks
online front-ends
Fingerprint recognition
tracking
Browser Security
Compositionality
LSTM
Resiliency
time series
Time series analysis
recurrent neural nets
browser fingerprint
browser fingerprint evolution
browser fingerprint tracking chain
input feature vector
LSTM model
Stability analysis
stateless tracking technique
track Web attackers
training set
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by
grigby1
on Fri, 04/05/2019 - 9:23am
Approximation algorithms
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Compositionality
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
homology
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
pattern clustering
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by
grigby1
on Fri, 03/15/2019 - 10:55am
Accidents
Correlation
Correlation analysis
correlation methods
Injuries
Metrics
potential risk
potential risks
potential system security threat prediction identification
pubcrawl
resilience
Resiliency
Scalability
security
system security
Time Frequency Analysis
time series
Time series analysis
time-and-frequency distribution
time-and-frequency localization
wavelet analysis
wavelet spectra correlation analysis
wavelet transforms
biblio
Time Series Forecasting by Evolving Deep Belief Network with Negative Correlation Search
Submitted by
grigby1
on Wed, 03/06/2019 - 3:30pm
Bayes methods
Bayesian optimization
belief networks
collaboration
composability
DBN
Deep Belief Network
derivative-free optimizer-negative correlation search
forecasting
forecasting theory
grid search
Human behavior
hyperparameters optimization
learning (artificial intelligence)
learning rates
Load modeling
Mathematical model
Metrics
Negative correlation search
neural nets
neural network models
Neural networks
optimisation
optimization
policy-based governance
pubcrawl
random search
resilience
Resiliency
Scalability
search problems
time series
Time series analysis
time series datasets
time series forecasting
Training
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by
grigby1
on Wed, 11/14/2018 - 12:21pm
Analyst Intuition
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Data mining
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
High Velocity
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by
grigby1
on Wed, 07/18/2018 - 9:05am
Anomaly Detection
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
field devices
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
LSTM networks
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
resilience
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
1
2
next ›
last »