Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
pubcrawl
resilience
Resiliency
telecommunication traffic
composability
Benchmark testing
network security
Complexity theory
documentation
network intrusion detection
IDS
Labeling
datasets
CIC-IDS-2017
CSE-CIC-IDS-2018
network intrusion
biblio
Usage of Classifier Ensemble for Security Enrichment in IDS
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
Intrusion Detection
pubcrawl
resilience
Resiliency
standards
composability
network security
renewable energy sources
computer networks
IDS
automation
classification
intrusion
threat
biblio
Lightweight Intrusion Detection System(L-IDS) for the Internet of Things
Submitted by grigby1 on Wed, 08/16/2023 - 3:39pm
Internet of Things
Intrusion Detection
pubcrawl
resilience
Resiliency
privacy
Medical services
composability
Market research
Scalability
IDS
information sharing
decision tree algorithm
biblio
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm
Submitted by grigby1 on Wed, 08/16/2023 - 3:39pm
IDS
Sequential event patterns
security events
probabilistic attack prediction
knowledge based anomaly detection
IPAM
Intrusion detection by Event Analysis
Generalized Sequential Patterns (GSP)
CSE-CIC-IDS 2018 data set
Behavioral sciences
Intelligent systems
feature extraction
Prediction algorithms
network security
DDoS Attacks
Benchmark testing
composability
Data models
Resiliency
resilience
pubcrawl
security
biblio
Digital Forensic Analysis on Caller ID Spoofing Attack
Submitted by grigby1 on Wed, 08/16/2023 - 3:38pm
IDS
SIM card forensic
NIST SP 800-101R1
mobile forensic
caller ID spoofing
fraud
digital forensic
Oxygen
digital evidence
information security
Digital Forensics
composability
Big Data
NIST
Conferences
Resiliency
resilience
pubcrawl
biblio
New Image Encryption Algorithm based on Pixel Confusion-Diffusion using Hash Functions and Chaotic Map
Submitted by grigby1 on Fri, 08/11/2023 - 1:56pm
machine learning algorithms
pubcrawl
resilience
Resiliency
privacy
chaotic communication
Compositionality
Hash functions
Quantization (signal)
hash algorithms
image encryption
Resists
chaos theory
Diffusion processes
pixel confusion and diffusion
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
Secure Hashing using BCrypt for Cryptographic Applications
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
reliability theory
SHA hashing
Rainbow Attack
MD5 hash
dictionary attack
Blowfish cipher
Bcrypt
passwords
hash algorithms
pubcrawl
Force
Data Breach
Compositionality
Production
Industries
Cryptography
Resiliency
resilience
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
biblio
Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
hash algorithms
Rail Fence Cipher
Myszkowski
SHA-256
Rails
Hash Function
digital images
Image resolution
Multimedia systems
Ciphers
Hash functions
Histograms
Compositionality
Cryptography
Resiliency
resilience
pubcrawl
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »