Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security devices
biblio
The development of the data transfer protocol in the intelligent control systems of the energy carrier parameters
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
accounting of the energy carrier consumption
Intelligent Data and Security
Intelligent Data Security
Wireless Smart Sensors
wireless smart sensor
thermodynamic parameters
reliable data transmission
radio channel
intelligent control systems
heat control system
energy measurement
energy carriers
energy carrier parameters
data transfer protocol
control signals delivery
control devices
Scalability
wireless network
data transfer
security devices
intelligent control system
intelligent control
Compositionality
integrated circuits
Automation systems
Wireless communication
wireless sensor networks
pubcrawl
Resiliency
Software
Protocols
biblio
Using advanced detection and prevention technique to mitigate threats in SDN architecture
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
SDN architecture
services deployment
SDN threats
OpenFlow KPG-MT
MITM
man in the middle attacks
malware-based attacks
KPG-MT
DoS/DDoS
distributed SDN
centralized network abstraction
DDoS Attack Prevention
centralized architecture
security devices
Denial of Service attacks
Software Defined Networks
Computer crime
malwares
SDN
authentication
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer architecture
invasive software
performance evaluation
malware
computer network security
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Intrusion Detection in Smart Grid Using Data Mining Techniques
Submitted by grigby1 on Thu, 03/28/2019 - 3:17pm
power meters
Training
Support vector machines
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
smart grid environment
Smart Grid
Smart Environments
Smart City
smart appliances
security devices
pubcrawl
Artificial Neural Networks
power engineering computing
Metrics
IoT
invasive software
intrusion detection system
Intrusion Detection
Internet of Things (IoT)
Internet of Things
Human behavior
Data Mining Techniques.
Data mining
Cybersecurity
composability
biblio
Scheduling of Security Resources in Software Defined Security Architecture
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
security data plane
software defined security architecture
Software Defined Security
software defined networking
security tasks
security task abstracting
security scheduling mechanism
security resources scheduling
security resources
security resource scheduling algorithm
security resource capability abstracting
security protection task
security protection efficiency
security devices
security demand
automated security business management
security control plane
scheduling
resource pool
Resiliency
resilience
pubcrawl
orchestration
open security devices
new-type open security devices
Network Security Architecture
network security
Knowledge Discovery
distributed computing
computer network security
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement