Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
Novel IDS security against attacker routing misbehavior of packet dropping in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:32pm
Nodes
telecommunication security
telecommunication network routing
security
Secure Routing
routing. Security
Routing protocols
Routing
Resiliency
resilience
Receivers
pubcrawl
Packet dropping
Attack detection
mobile ad hoc networks
mobile ad hoc network
Metrics
Measurement
MANET
Malicious Attacker
intermediate nodes
IDS security system
IDS
Compositionality
attacker routing misbehavior
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
policy-based governance
network security
neural chips
Neural networks
neuromorphic cognitive computing
neuromorphic computing
neuromorphic computing system
Neuromorphics
Neurons
NSCS
physical neuromorphic chip
network intrusion detection
power efficient neuromorphic processors
pubcrawl
resilience
Resiliency
security of data
synaptic weights
Training
TrueNorth System
unsupervised deep learning
DVF
auto encoder
Biological neural networks
Cognitive Computing
computer security
crossbar weight
cyber security
Deep Neural Network
discrete values
discrete vector factorization
Artificial Neural Networks
hybrid encoding
IBM neurosynaptic core simulator
IBM TrueNorth neurosynaptic chip
IDS
Intrusion Detection
learning (artificial intelligence)
machine learning
Matrix decomposition
Metrics
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
Intrusion Detection in the RPL-connected 6LoWPAN Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
6LoWPAN
collaboration
composability
cyber security
ETX
IDS
Internet of Things
Intrusion Detection
IPv6
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
biblio
A smart city cyber security platform for narrowband networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
narrowband technologies
threat deep learning-based model
smart city cyber security platform
Smart City
smart cities
Sigfox
security of data
Resiliency
resilience
public administration
pubcrawl
Network Security Architecture
NB-IOT
Computer crime
narrowband networks
Narrowband
LoRaWAN
learning (artificial intelligence)
Intrusion Detection
IDS
DoS
denial of service attack
deep learning
Data models
cyber-attack detection
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
WIDIP: Wireless distributed IPS for DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
IP networks
Wireless communication
wireless
tools
Servers
Resiliency
pubcrawl
Metrics
IPS
Communication system security
IDS
Human behavior
DoS
DDoS Attack Prevention
DDoS
Computer crime
composability
biblio
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
fuzzy classifiers
VM failures
virtual machines
Training
security of data
Resiliency
pubcrawl
pattern classification
Learning systems
learning (artificial intelligence)
KDD99
intrusion tolerance
Intrusion Detection Systems
Intrusion Detection
IDS
groupware
Anomaly Detection
fuzzy classifier
Fault-Tolerance
fault tolerant computing
Ensemble Learning
Decision trees
Decision Tree
dataset segmentation
composability
Collaborative Systems
collaborative ensemble-learning
collaboration
cloud-based distributed system
Cloud Computing
Bagging
biblio
A Network IDS Model Based on Improved Artificial Immune Algorithm
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
immune mechanism
Transportation
smart cities
Resiliency
random variation
pubcrawl
novel IDS detection model
novel artificial immune algorithm
network intrusion detection problem domain
network IDS model
mathematical knowledge
key modules
intrusion tolerance
improved artificial immune algorithm
Immune system
artificial immune systems
IDS system
IDS
dynamic demotion
dynamic clonal selection algorithm
detector tolerance module
detection rate
controllable variation
continuous bit matching algorithm
computer network security
composability
clone
Big Data
autologous
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »