Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information entropy
biblio
Using information entropy to analyze secure multi-party computation protocol
Submitted by grigby1 on Fri, 07/15/2022 - 1:02pm
Pervasive Computing Security
uncertainty
Semi-Honest Model
security
secure multi-party computation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Analytical models
multi-party computation
Metrics
information security
information interaction
information entropy
Human Factors
Human behavior
Computational modeling
Big Data
biblio
Research on DDoS Attack Detection based on Multi-dimensional Entropy
Submitted by grigby1 on Wed, 04/13/2022 - 10:31am
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Entropy
computer science
detection algorithms
Metrics
Time complexity
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service
Dimension detection
threshold
biblio
Network Information Security Pipeline Based on Grey Relational Cluster and Neural Networks
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
information science
Resiliency
resilience
pubcrawl
policy-based governance
Pipelines
Neural networks
Metrics
machine learning
Intrusion Detection
information security
Neural Network Security
information entropy
Grey Relational Cluster
Data mining
cyber physical systems
Computational modeling
Complexity theory
collaboration
Artificial Neural Networks
artificial neural network
biblio
Analysis and Detection of Android Ransomware for Custom Encryption
Submitted by grigby1 on Mon, 01/10/2022 - 12:15pm
android
android encryption
API
Bait file
Conferences
custom encryption
encryption
Entropy
Human behavior
information entropy
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Scalability
biblio
An Effective Target Address Generation Method for IPv6 Address Scan
Submitted by aekwall on Tue, 08/17/2021 - 4:04pm
Communication networks
ipv6 security
TGAs
IPv6
information entropy
address scan
policy-based governance
Prediction algorithms
clustering
security
composability
Resiliency
Metrics
pubcrawl
tools
Protocols
Predictive models
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
information distribution scheduling algorithm
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
content cache replacement
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
information entropy
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
Scalability
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
biblio
Tracing and detection of ICS Anomalies Based on Causality Mutations
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
Entropy
traceability of anomaly
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
Microwave integrated circuits
information entropy
industrial control system
industrial control physics
industrial control
ICS Anomaly Detection
ICS anomalies
Anomaly Detection
Data mining
Correlation
control engineering computing
comparison algorithm
causality mutations
causality modeling
causality mining algorithm
causal network
causal modeling algorithm
causal anomaly detection
anomaly source traceable
anomaly node
anomaly location strategy
anomaly detection algorithm
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 1:00pm
Switches
φ-entropy
SDN networks
network cyber security
forwarding logic
DDoS traffic formation
control logic
DDoS attack detection method
distributed denial of service attack
DDoS attack detection
denial-of-service attack
information entropy
network architecture
DDoS
microsoft windows
IP networks
Attack detection
software defined networking
SDN
telecommunication traffic
composability
Entropy
Computer crime
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A DDoS Attack Detection Method Based on Information Entropy and Deep Learning in SDN
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
DDoS Attacks
information entropy detection
fine-grained packet-based detection
DDoS attack traffic
DDoS attack detection method
convolutional neural network model
Software Defined Network
data plane
DDoS attack detection
control plane
information entropy
software defined networking
SDN
learning (artificial intelligence)
telecommunication traffic
composability
Entropy
deep learning
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
biblio
Collaborative Filtering Algorithm Based on Trust and Information Entropy
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Prediction algorithms
weighted information entropy
trust similarity
trust relationship
trust
time decay function
time decay
security
Scalability
robots
Resiliency
resilience
recommender systems
recommendation system
pubcrawl
collaboration
Pearson similarity
information entropy theory
information entropy
human trust
Human Factors
human computer interaction
Human behavior
filtering algorithms
Filtering
Entropy
computer theory
collaborative filtering algorithm
collaborative filtering
1
2
next ›
last »