Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
The Research on IOT Security Architecture and Its Key Technologies
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
information processing
scientific information technology
IoT security architecture
information security system
information industry
economic development
Network Security Architecture
WSN
RFID
radiofrequency identification
security of data
security threats
security architecture
pubcrawl
Resiliency
information security
computer architecture
Internet of Things
technological development
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network)
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
Resiliency
software defined networking
Software Defined Network
security threats
security challenges
SDN security
SDN architecture
Scalability
S-FlowRT
computer network management
resilience
pubcrawl
network security
heterogeneous networks
DoS(Denial of Service)
DoS attacks
denial of service attack
computer network security
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
Threats Against the Virtual Machine Environment of NFV
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
privilege escalation
VM escape threats
Virtualization
virtualisation
architectural modeling
Cloud Computing
computer architecture
computer network security
Hardware
misuse patterns
network function virtualization
NFV
on-demand network functions
Virtual machining
pubcrawl
security
security reference architecture
security threats
Software
UML diagrams
Unified modeling language
virtual machine environment
Virtual machine monitors
virtual machine security
virtual machines
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »