Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network attack detection
biblio
Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs
Submitted by aekwall on Mon, 11/29/2021 - 1:11pm
security
Monitoring
Intrusion Detection
pubcrawl
Resiliency
composability
Knowledge engineering
Redundancy
Communication networks
telecommunication traffic
Data mining
Predictive Metrics
situational awareness
knowledge graph
network attack detection
network security situation awareness
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 10:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime