Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network activity
biblio
Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
Snort
QoS measurement
quality of service
resilience
Resiliency
SDN
SDN architecture
service comparison analysis
signature based detection method
QoS
Snort IDS
software define network architecture
software defined networking
telecommunication traffic
testing
Throughput
tools
pubcrawl
packet loss parameters
Packet loss
network quality
network activity
memory usage
intrusion detection system
IDS
existing network traffic
delays
CPU usage
computer network security
composability
bro IDS application
Bro
anomaly based detection method
biblio
An Elaborate Comprehensive Survey on Recent Developments in Behaviour Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
Intrusion Detection
telecommunication traffic
survey
security of data
Resiliency
Radio frequency
pubcrawl
network activity
intrusion detection technology
Intrusion Detection Systems
Artificial Neural Networks
intrusion
IDS
detection
data monitoring
composability
Cloud Computing
Classification algorithms
behaviour based intrusion detection systems
behavior
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 3:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 12:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers