Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
Transparent IDS Offloading for Split-Memory Virtual Machines
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
IDS
VMemTrans
VM migration
VM introspection
transparent IDS offloading
split-memory VM
split-memory virtual machines
split migration
remote hosts
offloaded IDS
multiple hosts
large-memory VM
IDS offloading
exchanges memory data
access VM remote memory
security of data
Instruction sets
resilience
virtual machines
Virtual machining
maintenance engineering
Memory management
Runtime
composability
Big Data
Resiliency
pubcrawl
Intrusion Detection Systems
Monitoring
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
telecommunication traffic
realistic background traffic
IDS dataset
efficient IDS
complex environments
CICIDS2017 dataset
denial-of-service attack
cyberattack
IDS
resilience
Buildings
Cyber Attacks
DDoS Attacks
learning (artificial intelligence)
real-time systems
composability
machine learning techniques
telecommunication security
computer network security
Resiliency
pubcrawl
Intrusion Detection Systems
Intrusion Detection
security
machine learning
biblio
Towards Automated Generation of Function Models from P IDs
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
function model
plant topology models
P&ids
operator decision support systems
modeling process
modeling patterns
MFM models
MFM
knowledge acquisition
Functional Modeling
pubcrawl
automationml
Automated model generation
automated generation
Decision support systems
IDS
resilience
composability
production engineering computing
Resiliency
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
IDS
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
NSL-KDD
multiple machine learning algorithms
machine learning algorithms
identifying attacks
ID
detect attack
current IDS
computer safety hazards
complex & increasing tasks
artificial intelligence & machine learning algorithms
anomaly-based IDS
accurate intrusion detection
learning (artificial intelligence)
cyber-attacks
resilience
computer networks
Attack detection
network security
composability
intrusion detection system
Artificial Intelligence
computer network security
Resiliency
pubcrawl
cyber security
security of data
biblio
An Improved BICM-ID Receiver for the Time-Varying Underwater Acoustic Communications with DDPSK Modulation
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
improved bit-interleaved
acoustic communications
BICM-ID algorithm
DDPSK demodulator
DDPSK modulation
differential phase shift keying
Doppler shift
Doppler shifts
double differential phase shift
improved BICM-ID receiver
7.4 dB gain
interleaved codes
noise figure 10.2 dB
noise figure 7.4 dB
novel receiver architecture
phase noise
signal-to-noise ratio loss
SNR loss
underwater acoustic DSSS communications
modulation coding
Resiliency
Signal to noise ratio
composability
Receivers
Decoding
resilience
IDS
multipath channels
error statistics
pubcrawl
Phase shift keying
iterative decoding
underwater acoustic communication
Underwater acoustics
Demodulation
radio receivers
spread spectrum communication
10.2 dB gain
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
Syntactics
Snort rule combinations
Snort community
public rulesets
open-source IDS system
network security software
IDS rule verification
IDS rule redundancy verification
commented rules
anomaly network traffics
Snort
IDS
resilience
tools
Semantics
Redundancy
Payloads
telecommunication traffic
composability
intrusion detection system
Protocols
computer network security
Resiliency
pubcrawl
IP networks
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
IDS detection accuracy
cyber-physical DER Modbus devices
D-IDS
data-integrity attacks
DER
DER inverters
DER Modbus communication
discrete data points
DoS packets
DoS type attacks
hardware-in-the-loop
hardware-in-the-loop CPS DER
analog data points
IDS detection rate
IEEE 13-bus distribution grid
Modbus-specific IDS rule sets
model-based approach
native clear-text packet
open- source IDS rule syntax formats
physics-based threshold bands
testbed-based evaluation
time 0.25 ms
transaction-based threshold bands
CPS Security
pubcrawl
Resiliency
computer network security
Data models
Computational modeling
Smart Grid
standards
composability
Denial of Service attacks
Protocols
computer architecture
standard protocols
Syntactics
resilience
data integrity
timing
distribution networks
IDS
distributed energy resources
distributed intrusion detection system
Modbus
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »