Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious behavior
biblio
Blockchain Based Decentralized Trust Management framework
Submitted by aekwall on Mon, 06/28/2021 - 11:30am
IoT
Scalability
Data models
Resiliency
pubcrawl
policy-based governance
wireless sensor networks
blockchain
Mathematical model
Markov processes
computer science
Trust management
malicious behavior
Proof of trust
false trust
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
SDN
malicious virtual machine detection
Memory Analysis
Metrics
privacy
privacy leakage
pubcrawl
resilience
Resiliency
malicious behavior oriented framework
traceability module
virtual machines
Virtual machining
virtualisation
virtualization facility memory evidence extraction
virtualization privacy
volatile data loss problems
full-traffic flow detection technology
cloud-based malicious behavior detection mechanism
composability
Computer crime
cyber crime
cybercrimes
Digital Forensics
digital forensics framework
emergency services
Cloud Computing
Human behavior
Human Factors
IaaS service based forensics module
infection topology
information forensics
law enforcement
malicious behavior
biblio
Malicious behavior in online social network
Submitted by grigby1 on Thu, 02/23/2017 - 11:17am
content
estimation
malicious behavior
online social network
OSN
OSNs
post
privacy
Protocols
security
security of data
social networking (online)
Suspensions
Twitter
user
pubcrawl170105
biblio
DAIDS: An Architecture for Modular Mobile IDS
Submitted by BrandonB on Thu, 04/30/2015 - 12:26pm
intrusion detection system
third party mobile applications
telecom operator
security of data
profile applications
North America
Monitoring
modular mobile IDS
mobile radio
mobile devices
mobile computing
malware
malicious behavior
Android (operating system)
Intrusion Detection
Humanoid robots
dynamic analysis
Detectors
detection algorithms
Databases
DAIDS
behavior profiling
behavior analysis
Anomaly Detection
Androids
Android platform