Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data set
biblio
Research on vehicle network intrusion detection technology based on dynamic data set
Submitted by grigby1 on Thu, 06/09/2022 - 9:12am
network security
internet of vehicles security
data set
cyber physical systems
Ethernet
Resists
Human Factors
Intelligent vehicles
network intrusion detection
Metrics
feature extraction
cyber security
Internet of Vehicles
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
machine learning algorithms
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
CAPTCHA Identification Based on Convolution Neural Network
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
CAPTCHA
Web site
text-based scheme
segment
live interactive proofs
image features
GoogLeNet
data set
convolution neural network
CAPTCHA identification
AlexNet
learning (artificial intelligence)
image segmentation
feedforward neural nets
convolution
captchas
automation
internet
composability
pubcrawl
Human behavior
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
Choosing a profile length in the SCAP method of source code authorship attribution
Submitted by BrandonB on Mon, 05/04/2015 - 2:21pm
authorship attribution
C++ language
data set
frequency control
Frequency measurement
information retrieval
Java
Java language
plagiarism detection
profile length
RNA
SCAP method
software forensics
source code (software)
source code authorship attribution