Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection techniques
biblio
An Approach for P2P Based Botnet Detection Using Machine Learning
Submitted by grigby1 on Fri, 04/14/2023 - 3:58pm
malware
Workstations
Support vector machines
Resiliency
resilience
pubcrawl
Performance analysis
network security
Metrics
analysis
machine learning
Instruments
detection techniques
Compositionality
composability
botnets security
botnet
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
Submitted by aekwall on Mon, 02/18/2019 - 12:57pm
data aggregation
Metrics
sybil attacks
wireless sensor networks
Wireless Sensor Network
Routing protocols
misbehavior detection parameters
magnetic sensors
fair resourse allocation
detection techniques
telecommunication security
biosensors
batteries
Attacker node
Sybil attack
composability
pubcrawl
Program processors
security
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
information and communication technologies
telecontrol
software-defined networking controller
software defined networking
SDN security
SDN controller
SDN
Resiliency
remotely controlled networks
pubcrawl
Protocols
Metrics
IP networks
internet
centralised control
Human behavior
Entropy
detection techniques
DDoS detection
DDoS Attacks
DDoS attack detection
control systems
computer network security
Computer crime
composability
Communication Systems
centralized controller
biblio
Towards a hardware Trojan detection methodology
Submitted by BrandonB on Wed, 05/06/2015 - 11:31am
delays
detection techniques
Hardware
Integrated circuit modeling
integrated circuits
Power demand
security hardware Trojans horses
Trojan horses
trusted hardware
Vectors