Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
Analysis of Machine Learning Techniques for Ransomware Detection
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
malware detection
Resiliency
ransomware families
Ransomware
Random Forest
Scalability
pubcrawl
policy-based governance
pattern classification
Metrics
CICAndMal2017 dataset
machine learning-based ransomware detection
machine learning
learning (artificial intelligence)
invasive software
Human behavior
cryptology
computer networks
composability
classification methods
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Recognizing Email Spam from Meta Data Only
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
meta data features
unsolicited e-mail
static set
spam detection approach
spam detection
spam classifiers
Scalability
pubcrawl
pattern classification
Metrics
Cryptography
meta data
Human Factors
Human behavior
feature extraction
engineered features
end-to-end encryption
encrypted emails
email spam
CSDMC2010 dataset
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »