Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 9:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole amp;Grayhole Attacks
Submitted by aekwall on Mon, 03/11/2019 - 9:36am
Grayhole
Trust Routing
wormhole attacks
Wormhole
RPL protocol
open standard routing protocol
network traffic
network topology
loT
light weight Trust based mechanism
IoT routing protocol RPL
Indirect Trust
Grayhole attacks
RPL
direct trust
telecommunication traffic
trust
Routing
Routing protocols
composability
pubcrawl
Resiliency
security
Internet of Things
Scalability
computer network security
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 11:17am
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 9:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection
biblio
Modeling User Communities for Identifying Security Risks in an Organization
Submitted by grigby1 on Mon, 03/05/2018 - 12:23pm
security of data
Peer-to-peer computing
Personnel
production environment
pubcrawl
resilience
Resiliency
Scalability
security
peer to peer security
security risks
team working
tools
UEBA
User and Entity Behavior Analytics
user communities
user feedback
Measurement
Companies
entity behavior analytics
feature-based weight assignments
Human behavior
Human Factors
insider threat
Louvain method
Louvain modularity
community detection
Metrics
network traffic
Niara's data
optimization
peer group creation
Peer grouping
peer grouping employees
biblio
Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure
Submitted by K_Hooper on Wed, 02/28/2018 - 10:39am
Ports (Computers)
Training
static based attack detection techniques
smart power grids
smart meters
Smart Grids
smart grid IPv6 based advanced metering infrastructure
smart grid communications
smart grid advanced metering infrastructure
Smart Grid
security of data
Routing
Resiliency
pubcrawl
power system measurement
collaboration
Planar Key
object detection
network traffic
moving target defense intrusion detection system
moving target defense
Metrics
MATLAB
ipv6 security
IP networks
Intrusion Detection Systems
Intrusion Detection
Difference Plane
composability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »