Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security
biblio
Securing intelligent substations: Real-time situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
Monitoring
Substations
substation intrusion detection-prevention system
substation automation
SIEM system
SIEM
security of data
security information and event management system
real-time systems
real-time situational awareness
Protocols
power engineering computing
computer security
IPS
intelligent substation
IEC61850
IDS
IDPS
electrical distribution companies
DNP3
cyber security
critical infrastructure system
critical infrastructure cyber security defense system
critical infrastructure
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks
Submitted by BrandonB on Fri, 05/01/2015 - 8:20am
Ports (Computers)
wavelet transforms
wavelet transform
two-dimensional image
traffic signal
time-frequency representation technique
Time-frequency Analysis
telecommunication traffic
signal processing method
S-transform
Probes
probe attacks
accurate attack signatures
Otsu method
Intrusion Detection Systems
internet
image processing method
IDS
frequency components
DoS attacks
denial-of-service detection
computer network security
Computer crime
biblio
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:37am
power system networks
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA)
smart power grids
Smart Grids
Smart Grid
security of data
SCADA systems
SCADA cybersystems
Protocols
power system security
behavior-based concept
multilayer cyber-security framework
multiattribute SCADA-specific intrusion detection system
Intrusion Detection
IDS
heterogeneous white list
Detectors
Cybersecurity
cyber-attack threats
Current measurement
computer security
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods
biblio
Cloud Computing Vulnerability: DDoS As Its Main Security Threat, and Analysis of IDS As a Solution Model
Submitted by BrandonB on Thu, 04/30/2015 - 1:14pm
cloud
DDoS
IDS
security
Vulnerability
biblio
An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
Submitted by BrandonB on Thu, 04/30/2015 - 1:11pm
Cloud Computing
DDoS Attack
ICMP Flood
IDS
IDSServer
Saa SCloud
SIDSCC
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
« first
‹ previous
…
6
7
8
9
10
11
12
13
14