Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network attacks
biblio
Combining Machine Learning and Behavior Analysis Techniques for Network Security
Submitted by aekwall on Tue, 09/21/2021 - 10:46am
Prediction algorithms
Random Forest
neural network
network attacks
kullback-leibler divergence
Hausdorff distance
Confidence Index
Combination
Decision Tree
security
DoS
IDS
Entropy
machine learning
machine learning algorithms
Intrusion Detection
Neural networks
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
security of data
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
network intrusion detection
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
defense
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
adversarial example
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
IoT
telecommunication traffic
Scalability
Resiliency
pubcrawl
network traffic analysis
network traffic
network security
network provider
network attacks
IoT traffic
computer network security
Intrusion Detection
Internet of Things
information protocol.
Hurst parameter
Hurst flow parameter
DPI software system
dpi
deep packet inspection system
deep packet inspection
biblio
Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
Submitted by grigby1 on Mon, 12/28/2020 - 1:02pm
mobile ad hoc networks
untrue nodes
Throughput
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
pernicious hubs
performance evaluation
network security
network attacks
ad hoc network
mobile ad hoc network
Metrics
MANET untrustworthy environment
genuine setting
Dynamic Source Routing (DSR)
DSR protocol
DSR convention
directing convention
Compositionality
Adhoc network
ad hoc systems
biblio
An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
Internet of Vehicle
wireless sensor networks
vehicular ad hoc networks
telecommunication traffic
security issues
Resiliency
pubcrawl
packet header analysis
network attacks
Metrics
low-powered embedded vehicle terminal
Kernel
Intrusion Detection System (IDS)
Intrusion Detection
Internet of Vehicles intrusion detection system
Internet of Vehicles
automobiles
internet
information security
IDS
Human Factors
Human behavior
feature extraction
cyber physical systems
Cryptography
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
convolutional neural nets
convolution
computer network security
car network
biblio
Using of an anonymous communication in e-government services: In the prevention of passive attacks on a network
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
government data processing
telecommunication security
security
Resiliency
resilience
Receivers
pubcrawl
Protocols
policy-based governance
passive attacks prevention
networking
network attacks
Monitoring
anonymous communication
Electronic government
e-government services
E-Government
digital participation
Delta
Data protection
Cybersecurity
communication technologies
Communication networks
commerce
collaboration
auctions
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
1
2
3
4
next ›
last »