Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network system
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
Image-Based Unknown Malware Classification with Few-Shot Learning Models
Submitted by grigby1 on Thu, 10/29/2020 - 11:10am
malware types
well-known models
Resiliency
resilience
pubcrawl
Prototypical Networks
proper defense policies
privacy
pattern classification
network system
microsoft malware classification challenge
Microsoft Malware Classification
Metrics
Matching Networks
massive benefit
automatic protection systems
malware samples
malware research
malware datasets
malware classification problems
malware classification
malware attacks
MalImg
machine learning area
learning (artificial intelligence)
invasive software
image-based unknown malware classification
Human behavior
few-shot learning models
few shot learning
biblio
LSTM for Anomaly-Based Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
network traffic
network system
Long-Short-Term Memory
CIDDS dataset
anomaly-based network intrusion detection
Long short-term memory
LSTM
computer science
deep learning
Recurrent neural networks
recurrent neural nets
Intrusion Detection
security of data
Anomaly Detection
testing
Training
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
intrusion detection system
computer network security
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection