Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnets
biblio
GANIBOT: A Network Flow Based Semi Supervised Generative Adversarial Networks Model for IoT Botnets Detection
Submitted by grigby1 on Fri, 04/14/2023 - 3:59pm
IoT security
telecommunication traffic
Semi supervised GAN
Resiliency
resilience
pubcrawl
Protocols
Metrics
Medical services
botnet
Intrusion Detection
Internet of Things
generative adversarial networks
DDoS Attack
Compositionality
composability
botnets security
botnets
biblio
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
IoT Kill Chain
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Probabilistic logic
privacy
Predictive models
Object recognition
attack surface
Internet of Things
Cyber Kill Chain
Chained Attacks
botnets
botnet
Attacks on IoT Devices
Attack Structure
Metrics
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Metrics
Surges
Robustness
Resiliency
resilience
pubcrawl
performance evaluation
optimization
Microelectronics
Bayesian optimization
machine learning
IoT
Decision trees
composability
botnets
Botnet detection
botnet
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
performance evaluation
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
IoT devices
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
Anomaly Detection
IoT Botnets
invasive software
Internet of Things
deep-learning classifiers
deep learning
Cybersecurity
confidentiality integrity and availability attacks
computer network security
composability
Classification algorithms
CIA attacks
botnets
Botnet detection
botnet activity
botnet
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
1
2
3
4
5
6
7
8
next ›
last »