Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Zero day attacks
biblio
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
Submitted by grigby1 on Thu, 12/01/2022 - 2:21pm
Detectors
Zero Day Attack Defense
Side Channel
ML Interpretability
Microarchitectural Attack Detection
Linearized Neural Network
Automatic Attack Sample Generation
Automated Hardware Performance Counter Engineering
Adversarial Machine Learning Attacks
codes
Zero day attacks
generative adversarial networks
Training
defense
Switches
side-channel attacks
microarchitecture
composability
Hardware Security
Hardware
Resiliency
resilience
Metrics
pubcrawl
biblio
Process trees & service chains can serve us to mitigate zero day attacks better
Submitted by grigby1 on Thu, 12/01/2022 - 2:21pm
standards
Computer graphics
users
Zero day attacks
human computer interaction
Data visualization
defense
computer security
composability
tools
Software
Resiliency
resilience
Metrics
pubcrawl
machine learning
cyber security
biblio
End Users Can Mitigate Zero Day Attacks Faster
Submitted by grigby1 on Thu, 12/01/2022 - 2:20pm
tools
cyber security
machine learning
IP networks
pubcrawl
Metrics
resilience
Resiliency
Cryptography
composability
computer security
defense
Data visualization
human computer interaction
Zero day attacks
users
biblio
A predictive zero-day network defense using long-term port-scan recording
Submitted by grigby1 on Thu, 12/01/2022 - 2:20pm
computer architecture
Computer hacking
Servers
pubcrawl
Metrics
resilience
Resiliency
composability
malware
defense
Market research
Reconnaissance
Zero day attacks
Ports (Computers)
biblio
Blockchain-Enabled Security Module for Transforming Conventional Inverters toward Firmware Security-Enhanced Smart Inverters
Submitted by grigby1 on Tue, 12/21/2021 - 12:38pm
malware
Zero day attacks
static malware analysis
smart inverter
smart contracts
Security Module
Resiliency
resilience
pubcrawl
Metrics
blockchain
Inverters
information and communication technology
Hardware
firmware security
Energy conversion
defense
Cybersecurity
composability
blockchains
biblio
Using MajorClust Algorithm for Sandbox-Based ATM Security
Submitted by grigby1 on Tue, 12/21/2021 - 12:38pm
Online banking
Zero day attacks
Whitelists
whitelisting
tools
software security
Software algorithms
sandboxing
Resiliency
resilience
pubcrawl
ATM
Metrics
Intrusion Protection
Filtering
evolutionary computing
evolutionary computation
defense
cyber security
composability
clustering
Big Data
biblio
When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
Submitted by grigby1 on Tue, 12/21/2021 - 12:37pm
composability
Databases
defense
Detectors
feature extraction
Hardware
machine learning
malware
Metrics
microarchitecture
pubcrawl
resilience
Resiliency
Zero day attacks
biblio
EZAC: Encrypted Zero-Day Applications Classification Using CNN and K-Means
Submitted by grigby1 on Tue, 12/21/2021 - 12:37pm
CNN
Collaborative Work
composability
Conferences
convolutional neural networks
defense
encrypted traffic
encryption
k-means
Metrics
pubcrawl
resilience
Resiliency
Traffic classification
Zero day attacks
zero-day application
biblio
Detection of Zero-Day Attacks in Network IDS through High Performance Soft Computing
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
intrusion detection system
Zero day attacks
visualization
Soft Computing
Resiliency
resilience
pubcrawl
neural network
Metrics
composability
Intrusion Detection
Interference
High performance computing
Fuzzy logic
defense
Data Security
Data Breach
Computers
biblio
Zero-Day Attack Packet Highlighting System
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
PCA
Zero day attacks
zero-day attack
security
Resiliency
resilience
pubcrawl
Protocols
principal component analysis
Communications technology
NIDPS
Metrics
Inspection
dpi
defense
Data mining
composability
1
2
3
4
5
next ›
last »