Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
artificial immune system
biblio
Security Analysis of Wireless Sensor Networks Using SIEM and Multi-Agent Approach
Submitted by grigby1 on Mon, 11/08/2021 - 12:33pm
multi-agent approach
artificial immune system
Artificial Intelligence
authentication
composability
Correlation
Human behavior
information security
Metrics
wireless sensor networks
pubcrawl
resilience
Resiliency
security
sensor security
Servers
SIEM
Wireless Sensor Network
biblio
A Human Immunity Inspired Intrusion Detection System to Search for Infections in an Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 1:43pm
human immunity inspired intrusion detection system
Windows Operating System Security
Windows operating system
security of data
security
receptors
operating systems (computers)
operating system
negative selection algorithm
microsoft windows
intrusion detection system
Intrusion Detection
Immune system
Operating systems security
Containers
computer software
computer security
composability
artificial immune system
Anomaly Detection
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
genetic algorithms
TSK+ fuzzy inference system
TSK+
Statistics
Sociology
Resiliency
pubcrawl
pattern classification
pathogenic associated molecular pattern
network intrusion detection
Mutual information
Intrusion Detection Systems
immune-inspired classification algorithm
Immune system
Anomaly Detection
Fuzzy sets
fuzzy reasoning
Fuzzy logic
Fuzzy inference systems
feature extraction
dendritic cell algorithm enhancement
Dendritic cell algorithm
danger theory
computer networks
computer network security
composability
artificial immune systems
artificial immune system
biblio
Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
dendritic cells
TC agent
Resiliency
pubcrawl
network packets
multiagents system
multi-agent systems
machine learning
Learning systems
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Immune system
host-based intrusion detection systems
AAIDS
dendritic cell
DC agent
danger theory
computer network security
Computer hacking
Computational modeling
composability
artificial immune systems
artificial immune system
agent-based artificial immune systems
AG agent
adaptable agent-based IDS
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
HTTP botnet detection
transport protocols
Training
telecommunication traffic
Resiliency
resilience
pubcrawl
Peer-to-peer computing
P2P botnet detection
Metrics
malware
IRC botnet detection
IP networks
invasive software
Immune system
hypermedia
artificial immune system
DNS botnet detection
corporate area networks
computer systems
computer network security
Computer crime
Compositionality
clonal selection algorithm
Classification algorithms
botnets
Botnet detection
botnet
BotGRABBER system
benign network traffic
artificial immune systems
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 11:32am
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune