Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnets
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
White-Hat Worm Launcher Based on Deep Learning in Botnet Defense System
Submitted by grigby1 on Tue, 03/09/2021 - 2:21pm
IoT system
worms placement
white-hat worm launcher
white-hat botnets
Training data
Resiliency
resilience
pubcrawl
Metrics
Mathematical model
malware
malicious botnets
learning (artificial intelligence)
BDS
IoT
invasive software
Internet of Things
Grippers
deep learning
Data models
computer network security
computer network performance evaluation
composability
botnets
botnet defense system
botnet
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
Whispering Botnet Command and Control Instructions
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Compositionality
whispering botnet command and control instructions
whisper
stealthy communication methods
radar communication
peer-to-peer communication infrastructure
dark communication strategy
control bots
C&c
bidirectional botnet command and control operations
command and control systems
botnet
Cryptography
Metrics
botnets
invasive software
Protocols
internet
computer network security
Resiliency
pubcrawl
Peer-to-peer computing
blockchain
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Metrics
modern malware
host-based intrusion detection system
botnet detection system
botnet attack detection
Biological cells
botnet
genetic algorithm
genetic algorithms
Compositionality
tools
botnets
invasive software
network security
intrusion detection system
computer network security
Resiliency
pubcrawl
IP networks
Intrusion Detection
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
road safety
vehicular bots
vehicular botnets
vehicular botnet communication
vehicular botnet attacks
VANET Security
SHIELDNET
Reputation-Based Security
Internet botnets
inter-vehicular communications
efficiency 77.0 percent
adaptive detection mechanism
collision avoidance
botnet
Intrusion Detection
learning (artificial intelligence)
Compositionality
Metrics
vehicular ad hoc networks
botnets
invasive software
standards
Protocols
internet
computer network security
Resiliency
pubcrawl
machine learning algorithms
machine learning
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »