Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
Intrusion Detection System Framework Using Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 4:42pm
machine learning
tools
telecommunication traffic
SVM (Support Vector Machine)
Support vector machines
resilience
privacy
Predictive Metrics
machine learning algorithms
IDS
intrusion detection system
Intrusion Detection
Correlation and Chi-Square Based feature selection algorithms
Artificial Neural Networks
ANN (Artificial Neural Networks)
composability
Resiliency
pubcrawl
biblio
Method of Detecting FDI Attacks on Smart Grid
Submitted by grigby1 on Thu, 12/02/2021 - 3:20pm
pubcrawl
Spatiotemporal phenomena
Smart Grid Sensors
Smart Grids
Smart Grid
Sensor Systems
Resiliency
resilience
real-time systems
Complexity theory
Intelligent sensors
IDS
Human Factors
Human behavior
FDI
cyber-physical system
Correlation
Compositionality
biblio
Combining Machine Learning and Behavior Analysis Techniques for Network Security
Submitted by aekwall on Tue, 09/21/2021 - 10:46am
Prediction algorithms
Random Forest
neural network
network attacks
kullback-leibler divergence
Hausdorff distance
Confidence Index
Combination
Decision Tree
security
DoS
IDS
Entropy
machine learning
machine learning algorithms
Intrusion Detection
Neural networks
biblio
A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 11:11am
false negative rate
Training
security
Resiliency
pubcrawl
network intrusion detection
Internet of Things
IDS
feature extraction
Network Security Architecture
Data processing
Data mining
cyber-physical systems
controller area network security
controller area network
Computational modeling
CNN
biblio
Integration of Firewall and IDS on Securing Mobile IPv6
Submitted by aekwall on Tue, 08/17/2021 - 4:05pm
Resiliency
ipv6 security
Mobile IPv6
Manganese
firewall
policy-based governance
DoS
IDS
composability
security
Metrics
pubcrawl
optimization
Protocols
Cloud Computing
Monitoring
IP networks
biblio
IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment
Submitted by aekwall on Tue, 08/17/2021 - 4:05pm
machine learning
Training
Traffic classification
Systems architecture
security
Resiliency
pubcrawl
policy-based governance
network function virtualization
Metrics
signature based defense
ipv6 security
IPv6
Intrusion Detection
IDS
Decision Tree
composability
Communication networks
Scalability
biblio
Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
pubcrawl
Metrics
Resiliency
Compositionality
AODV
Blackhole attack
IDS
sequence number
MANET security
biblio
Network Security System on Multiple Servers Against Brute Force Attacks
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
Monitoring
Servers
Security by Default
security
Scalability
Resiliency
resilience
pubcrawl
network security
DDoS Attack Prevention
IP networks
IDS
IDPS
Force
Fail2ban
Databases
Communication networks
biblio
Proposing Innovative Intruder Detection System for Host Machines in Cloud Computing
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
intruder detection system
Virtualization
Virtual machining
virtual machine security
virtual machine
Technological innovation
signature
security
Resiliency
resilience
pubcrawl
Prevention
Intrusion Detection
signature based defense
IDS
host machine
Engines
Cyber Physical System
Cryptography
composability
Cloud Computing
attack
Anomaly
alerts
Scalability
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
RPL Routing
Peer-to-peer computing
pubcrawl
resilience
Resiliency
Routing
routing loops
Routing Protocol
Routing protocols
RPL performance
network reliability
RPL routing security scheme
security
sensor devices
sensor nodes
telecommunication network topology
wireless link
wireless sensor networks
WSN
IDS
Blackhole attack
composability
computer network security
count data
data packets
destination data delivery
exchange data routing
expected IDS
Black hole attackers
Internet of Things
IoT
IP networks
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
network performance
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »