Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Traffic analysis
biblio
A Mechine Learning Approach for Botnet Detection Using LightGBM
Submitted by grigby1 on Fri, 04/14/2023 - 2:59pm
machine learning
Traffic analysis
Systems architecture
security
Resiliency
resilience
Radio frequency
pubcrawl
Metrics
botnet
Forestry
Compositionality
composability
component
Complexity theory
Classification algorithms
botnets security
Botnet detection
biblio
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis
Submitted by grigby1 on Fri, 03/31/2023 - 10:28am
Logic gates
pubcrawl
Human behavior
Scalability
telecommunication traffic
Virtual private networks
bitcoin
Distributed databases
Government
Weapons
Human Factors
Traffic analysis
Bitcoin transactions
Traceability Method
bitcoin security
biblio
Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach
Submitted by grigby1 on Thu, 10/20/2022 - 2:17pm
Object recognition
Network Address Translation
Traffic analysis
Resiliency
Device Identification
timing
Windows Operating System Security
composability
Wireless communication
feature extraction
internet
network security
resilience
Metrics
pubcrawl
IP networks
machine learning
biblio
Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection
Submitted by grigby1 on Wed, 06/15/2022 - 9:56am
Forestry
pubcrawl
Human behavior
Conferences
Scalability
Fingerprint recognition
bitcoin
traffic control
Online banking
Cyberspace
Traffic analysis
Tor hidden service
website fingerprinting
bitcoin security
biblio
Application Profiling From Encrypted Traffic
Submitted by grigby1 on Mon, 04/25/2022 - 2:24pm
ML
Traffic Forensic
Entertainment industry
Application Profiling
Traffic analysis
Inspection
Algorithms
deep packet inspection
education
pubcrawl
Forensics
real-time systems
telecommunication traffic
Protocols
Scalability
Resiliency
resilience
biblio
DPI Solutions in Practice: Benchmark and Comparison
Submitted by grigby1 on Mon, 04/25/2022 - 2:23pm
tools
security
pubcrawl
resilience
Resiliency
Scalability
privacy
Protocols
malware
Steady-state
deep packet inspection
Inspection
dpi
Protocol Recognition
Traffic analysis
biblio
Anomaly Detection using Machine Learning to Discover Sensor Tampering in IoT Systems
Submitted by grigby1 on Mon, 02/07/2022 - 3:47pm
real-time systems
traffic control
Traffic analysis
Smart City
sensor tampering
Sensor Systems
security
Resiliency
resilience
Pervasive Computing Security
pubcrawl
privacy
machine learning
Internet of Things
Forestry
composability
Anomaly Detection
biblio
Trojan Traffic Detection Based on Machine Learning
Submitted by grigby1 on Mon, 11/08/2021 - 12:34pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
Training
Traffic analysis
supply chain security
Resiliency
resilience
random forests
Classification algorithms
Network behavior analysis
machine learning algorithms
machine learning
feature extraction
Data models
cyber physical systems
cyber physical security
composability
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
1
2
next ›
last »