Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

hacking attacks

biblio

Visible to the public Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection

Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
  • pubcrawl
  • wireless LAN
  • wireless Internet environment
  • wireless integrated environment
  • Wireless fidelity
  • Wireless communication
  • wireless AP security
  • Wi-Fi
  • unauthorized AP
  • unauthorized Access Point detection
  • threat vectors
  • Support vector machines
  • support vector machine
  • security
  • RTT value data
  • Classification algorithms
  • protection
  • privacy
  • Prediction algorithms
  • multilayer perceptrons
  • military facilities
  • Metrics
  • machine learning algorithms
  • machine learning
  • learning (artificial intelligence)
  • information protection
  • hacking attacks
  • detection
  • computer network security
biblio

Visible to the public Big data analysis system concept for detecting unknown attacks

Submitted by BrandonB on Wed, 05/06/2015 - 10:41am
  • future attack detection
  • unknown attack detection
  • state agencies
  • service destruction
  • security systems
  • security
  • prevention system
  • personal information leakage
  • pattern matching methods
  • Monitoring
  • large-scale system attacks
  • Intrusion Detection
  • information management
  • information extraction
  • hacking attacks
  • advanced persistent threat detection
  • detection rate
  • defence technologies
  • Data storage systems
  • Data models
  • Data mining
  • data handling
  • cyber-attacks
  • critical infrastructures
  • Computer crime
  • Big Data analysis techniques
  • Big Data analysis system
  • Big Data
  • APT detection
  • Alarm systems

Terms of Use  |  ©2023. CPS-VO