Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firewalls
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 2:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
An SDN-based Firewall for Networks with Varying Security Requirements
Submitted by aekwall on Fri, 04/01/2022 - 2:11pm
security
security management
Computational modeling
Scalability
SDN
medical devices
pubcrawl
Resiliency
Firewalls (computing)
COVID-19
Filtering
connected medical devices
firewalls
Health Information Network
Monitoring
SDN security
biblio
Cooperative Machine Learning Techniques for Cloud Intrusion Detection
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
resilience
secure packet classifier
firewalls
composability
Wireless communication
machine learning techniques
Computational modeling
Cloud Security
Resiliency
privacy
pubcrawl
Intrusion Detection Systems
security
machine learning algorithms
machine learning
Cloud Computing
Training
biblio
Machine-Learning Based TCP Security Action Prediction
Submitted by aekwall on Tue, 09/21/2021 - 10:45am
Neural networks
Support vector machines
Computational modeling
Predictive models
machine learning
cyber security
Ensemble Learning
firewalls
Firewalls (computing)
Market research
prediction
TCP Security Action
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
physical objects
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
intrusion detection system
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
cyber-attacks
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
active querying
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
Modbus-TCP vulnerability
Industrial Control Systems
industrial firewall
Information Assurance
Intrusion Detection
Intrusion Detection and Prevention System
IP networks
malicious parameter command injection
Modbus TCP/IP protocol
industrial control and automation system security
Modbus/TCP
prevention systems
pubcrawl
real-time communication
refinery control
Scalability
transport protocols
DPI industrial firewall
Resiliency
composability
Predictive Metrics
attack mitigation
command injection attacks
deep packet inspection
denial of service attack
DPI capabilities
Networked Control Systems Security
firewalls
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning
Submitted by grigby1 on Wed, 11/04/2020 - 1:44pm
groupware
team working
teaching methods
teaching
student-centered education
soft skills
pubcrawl
professional skills
privacy
Logic gates
IPsec
guided inquiry collaborative learning materials
Guided inquiry
collaborative learning
Firewalls (computing)
firewalls
firewall
education
cybersecurity teaching
cybersecurity education
cyber physical systems
computer science education
computer aided instruction
Communication networks
Collaborative Work
1
2
3
4
5
next ›
last »