Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Botnet detection
biblio
Detection of Botnets in IoT Networks using Graph Theory and Machine Learning
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
malware
PSI-Graph
function call graphs
exploratory data analysis
Resiliency Coordinator
Botnet detection
Malware Analysis
graph theory
Technological innovation
botnet
IoT
Market research
Internet of Things
static analysis
sensors
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
information security
biblio
Analyzing Machine Learning-based Feature Selection for Botnet Detection
Submitted by grigby1 on Fri, 04/14/2023 - 4:00pm
Infrastructure
Support vector machines
Resiliency
resilience
pubcrawl
Protocols
network security
Metrics
malware
intrusion detection system
botnet
Feature Selection
feature extraction
Decision trees
Compositionality
composability
Classification algorithms
botnets security
Botnet detection
biblio
A Mechine Learning Approach for Botnet Detection Using LightGBM
Submitted by grigby1 on Fri, 04/14/2023 - 3:59pm
machine learning
Traffic analysis
Systems architecture
security
Resiliency
resilience
Radio frequency
pubcrawl
Metrics
botnet
Forestry
Compositionality
composability
component
Complexity theory
Classification algorithms
botnets security
Botnet detection
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Metrics
Surges
Robustness
Resiliency
resilience
pubcrawl
performance evaluation
optimization
Microelectronics
Bayesian optimization
machine learning
IoT
Decision trees
composability
botnets
Botnet detection
botnet
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
performance evaluation
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
IoT devices
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
Anomaly Detection
IoT Botnets
invasive software
Internet of Things
deep-learning classifiers
deep learning
Cybersecurity
confidentiality integrity and availability attacks
computer network security
composability
Classification algorithms
CIA attacks
botnets
Botnet detection
botnet activity
botnet
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
1
2
next ›
last »