Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
biblio
Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
pattern classification
wrapper feature selection
supervised machine learning technique
supervised learning algorithm
intrusion detection success rate
artificial neural network based machine
intrusion
Predictive Metrics
Signal processing algorithms
Artificial Neural Networks
network traffic
neural network
machine learning techniques
network intrusion detection
security of data
neural nets
deep learning
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Feature Selection
feature extraction
support vector machine
Support vector machines
machine learning algorithms
Classification algorithms
biblio
Edge Learning Based Green Content Distribution for Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 10:27am
quality of service
intelligent path selection
internet
Internet of Things
learning (artificial intelligence)
network distribution
network quality
network traffic
pubcrawl
intelligent
real-time systems
resilience
Resiliency
revolutionary future networking architecture
Routing
Scalability
telecommunication traffic
content distribution
information-centric networking
information-centric internet of things
Information Centric Networks
Information Centric Network
IC-IoT requirements
IC-IoT
green content distribution scheme
green computing
encoding
edge learning
edge computing
distributed coding based content transmission
distributed coding
Decision trees
Decision Making
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
biblio
Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
Human behavior
telecommunication traffic
service attack detection
Resiliency
resilience
pubcrawl
pattern clustering
Particle separators
network traffic
Metrics
Measurement
machine learning
learning (artificial intelligence)
anomaly based distributed denial of service attack detection
feature extraction
DoS-DDoS attacks
DDoS Attack Prevention
DDoS Attack
DBSCAN
computer network security
Computer crime
composability
Clustering algorithms
clustering algorithm
Attack vectors
biblio
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
Submitted by aekwall on Wed, 12/18/2019 - 1:24pm
SDN
virtual machines
virtual machine
Software Defined Network (SDN)
sFlow mitigation technology
sFlow
real time detection
Mininet
DDoS attack mitigation
distributed denial of service attacks
telecommunication control
Switches
resilience
Attack detection
Computer crime
OpenFlow
network traffic
Metrics
composability
pubcrawl
Human behavior
DDoS Attacks
software defined networking
real-time systems
Protocols
telecommunication traffic
DDoS
computer network security
biblio
Towards a Conversational Agent for Threat Detection in the Internet of Things
Submitted by aekwall on Mon, 12/16/2019 - 1:28pm
Internet of Things
Virtual Assistant
user speech
threat detection
telecommunication traffic
situational awareness
Scalability
pubcrawl
network traffic
network information
Metrics
invasive software
Intrusion Detection
conversational agents
Human behavior
DynamoDB Table
DDoS
conversational agent
conversation agents
consumer IoT networks
computer network security
Cloud Computing
botnet
anomalous traffic
Amazon Echo
Alexa
biblio
The Hamiltonian of Data Center Network BCCC
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
expandability
topology properties
telecommunication traffic
telecommunication network topology
security
Resiliency
pubcrawl
network traffic
network communication
Hamiltonian path
Hamiltonian
expandable data center network
BCCC network structure
data center networks
data center network structure
Conferences
computing resources
computer centres
composability
cloud computing development
Cloud Computing
Big Data
BCCC structure
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »