Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Monitoring
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
computer architecture
Internet of Things
Monitoring
IoT
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
Scalability
privacy
authorization
Prototypes
ABAC
trust
Smart homes
usage control
zero trust
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
adversarial example
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
defense
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
network intrusion detection
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
security of data
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
composability
defense
detection
Detectors
feature extraction
Hardware
Identification
machine learning
Metrics
microarchitecture
Monitoring
pubcrawl
resilience
Resiliency
side-channel attacks
Zero day attacks
Zero-day attacks
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
White Box Security
white box
security
active learning
Anomaly Detection
composability
Forestry
iRRCF
key performance indicators
KPI anomaly detection framework
Labeling
Metrics
Monitoring
Neural networks
pubcrawl
random forests
resilience
Resiliency
robust random cut forest
RRCF
RRCF algorithm
security of data
supervised learning
time series
Time series analysis
Unsupervised Anomaly Detection
Unsupervised Learning
user experience
white-box anomaly detection
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 3:48pm
security of data
Monitoring
Cloud Computing
Scalability
Servers
Protocols
Resiliency
pubcrawl
Prediction algorithms
Clustering algorithms
Anomaly Detection
Data mining
pattern clustering
Cloud Security
cloud
NSL-KDD
Anomaly
anomaly detection mechanisms
cloud infrastructures
clustering based algorithm
DBSCAN
decision based approach
f-score
incident handling model
isolation forest
Isolation Forest algorithm
Kmeans
local outlier factor(LOF)
nonclustering based algorithm
run time metrics
work factor metrics
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 3:42pm
Monitoring
telecommunication traffic
real-time systems
Resiliency
pubcrawl
composability
Metrics
internet
Fuzzy logic
fuzzy set theory
control systems
delays
wireless mesh networks
Linguistics
queueing theory
explicit rate messages
future queue state
fuzzy framework
network traffic load
performance efficiency
queue length
safe traffic adaptation
safe traffic adaptation model
self-configured technology
self-organized technology
Wireless Mesh Network Security
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
accountable financial transaction processing
bank account
bank data processing
banking service
BDB
blockchain-based distributed banking
centralized banks
composability
contracts
cryptocurrencies
Cryptography
Distributed Banking
distributed banking systems
distributed banking transactions
Distributed databases
distributed financial transaction processing
Distributed Ledger Technology
immutable transactions
Metrics
Monitoring
network accountability
permissioned blockchain
Protocols
pubcrawl
public key infrastructure
resilience
Resiliency
Resistance
smart contract
transaction processing
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
Accountability Solution
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
HIPAA
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
medical treatment process
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
resilience
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 12:40pm
Internet of Things
security of data
risk management
security
Monitoring
pubcrawl
resilience
Resiliency
control engineering computing
control systems
Buildings
risk analysis
documentation
building management systems
cyber-physical systems
Stakeholders
comprehensive risk assessment process
cost effective risk management
inter-networked control systems
smart building risk assessment case study
smart building risk assessment methodology
smart building stakeholders
smart buildings
Damage Assessment
biblio
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
security of data
Monitoring
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Conferences
Protocols
Communication networks
composability
network security
public domain software
transport protocols
Web servers
application layer protocol
Inspection
Dynamic Protocol Detection mechanisms
HTTP
monitoring systems
Protocol detection
protocol disambiguation
protocol-specific deep packet inspection
real-world monitoring operations
source network monitoring tools
widespread open-source network monitoring tools
dynamic networks
1
2
3
4
5
6
7
8
9
…
next ›
last »