Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic
biblio
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
industrial network
testing
telecommunication traffic
standards
simplified method
security incident detection
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
network traffic
Modbus protocol
machine learning
intrusion detection system
Anomaly Detection
industrial Modbus protocol
IDS system Zeek
IDS
identified signature recognition
identified anomaly recognition
ICS Anomaly Detection
ICs
fast incident detection
efficient incident detection
DoS Attack Detection
DNP3 protocol
distributed network protocol 3
digital signatures
computer network security
biblio
A Learning-based Data Augmentation for Network Anomaly Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
divide-augment-combine strategy
sampling methods
class imbalance problem
network anomaly detection
attack instances
augments data
data augmentation
data instances
Divide-Augment-Combine
Gallium nitride
generative adversarial model
high-quality data
learning-based data augmentation
network traffic traces
public network datasets
statistical sampling
synthetic instances
Generative Adversarial Learning
pattern classification
Scalability
Data models
Support vector machines
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
neural nets
security of data
Anomaly Detection
network traffic
Generators
generative adversarial networks
generative adversarial network
Predictive Metrics
data handling
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
computer science
Tree network topologies
Randomized LFU
Internet requirements
ICN primary features
content replacement scheme
computer network
caching strategy
caching algorithms
Cache Replacement Strategy
Abilene network topologies
named data network
in-network caching
Time complexity
cache storage
information-centric networking
Scalability
named data networking
network performance
telecommunication network topology
delays
network traffic
trees (mathematics)
internet
convergence
Computational modeling
simulation
pubcrawl
Human behavior
Resiliency
telecommunication traffic
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Reliability
dynamic networks
software analysis
offline data analysis
live traffic monitoring
Google Home
Google devices
dynamic analysis security testing infrastructure
Amazon devices
security testing
Amazon Echo
dynamic analysis
Google
testing
security controls
Internet of Things
network traffic
composability
telecommunication traffic
data privacy
IoT devices
computer network security
Resiliency
resilience
Metrics
pubcrawl
IoT
Monitoring
data analysis
security
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
security idea
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
network microsegmentation
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
data center network
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
zero trust
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
resilience
unique channel traits
traditional security policies
time series
Threshold secret sharing
telecommunication traffic
telecommunication channels
stable channel traits
security of data
security concern
secret reconstruction strategy
Scalability
Robustness
Resiliency
channel identifier
pubcrawl
one-dimensional time series
network traffic
network covert timing channel detection method
network covert timing channel
NCTC detection method
inter-packet delay
high-dimensional phase space
covert channels
Compositionality
chaos theory
chaos
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
IoT
telecommunication traffic
Scalability
Resiliency
pubcrawl
network traffic analysis
network traffic
network security
network provider
network attacks
IoT traffic
computer network security
Intrusion Detection
Internet of Things
information protocol.
Hurst parameter
Hurst flow parameter
DPI software system
dpi
deep packet inspection system
deep packet inspection
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »