Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnets
biblio
Feature selection to detect botnets using machine learning algorithms
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
ISCX repositories
Training
testing
Servers
Resiliency
pubcrawl
Proposals
pattern classification
Metrics
malware detection
machine learning algorithms
machine learning
learning (artificial intelligence)
ISOT repositories
botnet
invasive software
genetic algorithms
genetic algorithm
Feature Selection
feature extraction
feature evaluation
Compositionality
command and control systems
command and control
C4.5 algorithm
C&c
botnets
Botnet detection
biblio
Using SEIRS Epidemic Models for IoT Botnets Attacks
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
botnets
Compositionality
Metrics
pubcrawl
Resiliency
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
PeerHunter: Detecting peer-to-peer botnets through community behavior analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
mutual contacts
Resiliency
pubcrawl
Protocols
potential botnet communities
PeerHunter
Peer-to-peer computing
peer-to-peer botnets
P2P hosts detection component
P2P botnets
network security
botnets
Metrics
IP networks
feature extraction
Electronic mail
cyber-crimes
computer network security
Computer crime
Compositionality
community behavior analysis based method
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
biblio
Protecting DNS Services from IP Spoofing: SDN Collaborative Authentication Approach
Submitted by grigby1 on Tue, 10/03/2017 - 11:47am
authentication
botnets
DNS flooding attack
Human behavior
Metrics
network security
OpenFlow
pubcrawl
Resiliency
Scalability
SDN
spoofing detection
biblio
Enabling Software-Defined Network Security for Next-Generation Networks
Submitted by grigby1 on Tue, 10/03/2017 - 11:47am
botnets
Human behavior
Metrics
network security
networking
pubcrawl
Resiliency
Scalability
Software-Defined Networks
biblio
Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain
Submitted by grigby1 on Tue, 10/03/2017 - 11:47am
botnet
botnets
cyber security
HTTP automated software
Human behavior
malicious detection
Metrics
network security management
pubcrawl
Resiliency
Scalability
biblio
An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnet
botnets
Distributed Denial of Service (DDoS)
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
sFlow
Software-defined networking (SDN)
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »