Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion
biblio
Usage of Classifier Ensemble for Security Enrichment in IDS
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
Intrusion Detection
pubcrawl
resilience
Resiliency
standards
composability
network security
renewable energy sources
computer networks
IDS
automation
classification
intrusion
threat
biblio
An Innovative Method in Classifying and predicting the accuracy of intrusion detection on cybercrime by comparing Decision Tree with Support Vector Machine
Submitted by grigby1 on Thu, 01/05/2023 - 2:20pm
composability
supply vector machines
network intrusion
Innovative Decision Tree
intrusion
deep learning.
support vector machine
Accuracy
Prediction algorithms
Classification algorithms
Predictive models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Support vector machines
machine learning algorithms
machine learning
biblio
Intrusion Representation and Classification using Learning Algorithm
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Training
security
Support vector machines
Intrusion Detection
pubcrawl
privacy
Classification algorithms
Metrics
Cybersecurity
testing
genetic algorithms
threat vectors
intrusion
decomposition
discriminatory
Fitness value
biblio
A Hybrid Machine Learning and Data Mining Based Approach to Network Intrusion Detection
Submitted by aekwall on Wed, 03/23/2022 - 9:22am
network intrusion detection
k-nearest neighbors
Inference Detection
support vector machine
intrusion
Naive Bayes
Network interfaces
Predictive Metrics
Decision trees
Support vector machines
Decision Tree
testing
composability
Resiliency
pubcrawl
machine learning
Training
biblio
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Industries
MANET Attack Detection
Traffic
Network
intrusion
detection
ANN
telecommunication traffic
WSN
MANET
Compositionality
Logic gates
Resiliency
Metrics
pubcrawl
Wireless communication
SDN
machine learning
Intrusion Detection
wireless sensor networks
Monitoring
biblio
Towards Intrusion Response Intel
Submitted by grigby1 on Tue, 01/25/2022 - 4:55pm
network security
threat
Response
IRS
intrusion
Automated Secure Software Engineering
Knowledge engineering
Natural languages
Intel
tools
composability
NIST
Conferences
Resiliency
resilience
pubcrawl
Intrusion Detection
biblio
Development of an Intrusion Detection System Using a Botnet with the R Statistical Computing System
Submitted by grigby1 on Wed, 09/08/2021 - 9:34am
Intrusion Detection
wide area networks
Resiliency
resilience
r
pubcrawl
Prevention
Metrics
malware
Logic gates
Bot
intrusion
Information services
Human behavior
Electronic publishing
detection
DDoS Attack Prevention
composability
botnet
biblio
Dynamic Countermeasure Knowledge for Intrusion Response Systems
Submitted by aekwall on Thu, 06/24/2021 - 11:56am
Resiliency
pubcrawl
composability
Automated Response Actions
automated
intrusion
countermeasure
dynamic
IRS
Knowledgebase
Response
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
1
2
3
next ›
last »