Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malicious Traffic
biblio
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
Submitted by grigby1 on Thu, 06/09/2022 - 2:53pm
traffic control
ssh-attacks
cyber-threat intelligence
Resiliency
Cowrie
honey pots
honeypots
Malicious Traffic
Human Factors
botnet
Monitoring
password
Object recognition
internet
Scalability
resilience
pubcrawl
IP networks
Servers
biblio
Polymorphic Adversarial DDoS attack on IDS using GAN
Submitted by aekwall on Mon, 03/29/2021 - 11:57am
adversarial data
Intrusion Detection
Generators
generative adversarial networks
Predictive Metrics
Malicious Traffic
Intrusion Detection Systems
gan
adversarial attacks
natural language processing
adversarial DDoS attacks
Attack Profile
defensive systems
generative adversarial networks (GAN)
polymorphic Adversarial DDoS attack
unknown types
Generative Adversarial Learning
security of data
Training
incremental learning
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
machine learning algorithms
Data models
malware
telecommunication security
Scalability
IDS
computer network security
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
security of data
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
network intrusion detection
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
defense
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
adversarial example
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
biblio
New security architecture using hybrid IDS for virtual private clouds
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
learning (artificial intelligence)
virtual private clouds
virtual private cloud
virtual machines
virtual machine security
virtual machine
telecommunication traffic
security architecture
private cloud environments
privacy vulnerability
neural nets
network-based intrusion detection system
network-based IDS
network security
Malicious Traffic
machine learning
IDS
intrusion detection system
IDS based ANN
hybrid Intrusion Detection System
hybrid IDS
host-based intrusion detection system
digital transformation
digital revolution
detection engine
data privacy
cyber-attacks
computer network security
Cloud Computing
artificial neural network
anomalies detection
pubcrawl
biblio
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
NSL-KDD dataset
unsupervised anomaly traffic detection techniques
telecommunication traffic
Support vector machines
support vector machine
stochastic gradient decent
sequential model
security of data
Resiliency
regression analysis
random forests
random forest classifier
pubcrawl
anomaly-based Intrusion Detection Systems
NSL-KDD
Malicious Traffic
machine learning techniques
machine learning
logistic regression
intrusive traffics
Intrusion Detection systems (IDSs)
Intrusion Detection Systems
Internet-based traffic
internet
gradient methods
composability
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
intrusion detection methods
Uniform resource locators
time series construction
Time series analysis
time series
target configuration
security
pubcrawl
predictive security metrics
Predictive models
potential external factors
Metrics
malware
Malicious Traffic
malicious activity
aggregation granularity
incident count forecasting
forecasting
cyber defense
cyber attack occurrences
Correlation
computer network security
Computer crime
binary occurrence metrics
belief networks
Bayesian networks
autoregressive moving average processes
auto-regressive integrated moving average models
ARIMA
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security