Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
industrial network
testing
telecommunication traffic
standards
simplified method
security incident detection
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
network traffic
Modbus protocol
machine learning
intrusion detection system
Anomaly Detection
industrial Modbus protocol
IDS system Zeek
IDS
identified signature recognition
identified anomaly recognition
ICS Anomaly Detection
ICs
fast incident detection
efficient incident detection
DoS Attack Detection
DNP3 protocol
distributed network protocol 3
digital signatures
computer network security
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
Polymorphic Adversarial DDoS attack on IDS using GAN
Submitted by aekwall on Mon, 03/29/2021 - 11:57am
adversarial data
Intrusion Detection
Generators
generative adversarial networks
Predictive Metrics
Malicious Traffic
Intrusion Detection Systems
gan
adversarial attacks
natural language processing
adversarial DDoS attacks
Attack Profile
defensive systems
generative adversarial networks (GAN)
polymorphic Adversarial DDoS attack
unknown types
Generative Adversarial Learning
security of data
Training
incremental learning
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
machine learning algorithms
Data models
malware
telecommunication security
Scalability
IDS
computer network security
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
IDS
telecommunication control
security
Scalability
resilience
pubcrawl
Packet loss
one-shot game
networked control systems
networked control system security
NCS
Monitoring
intrusion detection system
Industrial Control Systems
incomplete information based on game theory
Incomplete information
Networked Control Systems Security
Games
game theory
energy consumption
DoS attacks
Denial of Service attacks
cyber-physical systems
Control Theory
computer network security
belief networks
Bayes rule
Bayes methods
Predictive Metrics
composability
Resiliency
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
performance indicator metrics
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
K-NN
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
hybrid feature selection
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
API
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
network intrusion detection
wireless networks
wireless network
wireless Adhoc networks
wired environment
telecommunication security
security of data
security
Routing protocols
Resiliency
resilience
pubcrawl
pre-existing unfolding solutions
Network-based anomaly intrusion detection system
Network Simulator-2
network protocols
MANET Attack Detection
mobile radio
mobile adhoc networks
mobile ad hoc networks
Metrics
MANETs
intrusion detection techniques
intrusion detection system
infrastructure-less networks
IDS
fixed wired network
Compositionality
component
Ad hoc networks
ad hoc network
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 12/01/2020 - 1:48pm
intrusion detection system
Robustness
Resiliency
resilience
pubcrawl
Probes
Perturbation methods
network security suite
network intrusion detection systems
ML-based IDS
ML models
malware
malicious network traffic
malicious intrusions
adversarial attacks thwarting
IDS
generative adversarial networks
gan
Gallium nitride
feature extraction
computer network security
composability
anomalous traffic
adversary
adversarial perturbations
adversarial ML attack
Adversarial Machine Learning
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »