Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network administrators
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 12:37pm
convolutional neural networks
packet flows
networking related tasks
network traffic image orientation mappings
Internet traffic classification
deep convolutional neural networks
application network signatures
2-dimensional formulation
Network traffic classification
deep packet inspection
network administrators
Streaming media
deep learning
computer network security
quality of service
Bandwidth
machine learning
internet
neural nets
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
telecommunication traffic
Scalability
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 1:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
biblio
Challenges with Transition and User Accounting in Next Generation Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:58am
Hardware
internet
IP networks
IPv4
IPv6
Monitoring
network administrators
network control protocol
next generation networks
Organizations
Probes
Protocols
recursive inter network architecture
TCP/IP
user accounting