Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
IoT networks
telnet honeypot detection
SSH Honeypots
security
Scalability
resource-constrained interconnected smart devices
Resiliency
pubcrawl
probability
probabilistic estimation
potential dynamic threats
network intrusion
attacks
intrusion-related threats
intrusion mission
intrusion
Internet of things environment
Internet of Things
Human Factors
honey pots
cyber security crimes
computer network security
Computer crime
attacks mitigation
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Network Intrusion Detection Mechanisms Using Outlier Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
Intrusion Detection Subsystem
extensive network databases
Forestry
framework conduct
human blunder
information control
information mining
instrument mistake
intrusion
accessible information
network clients
network database framework
network intrusion
network intrusion detection mechanisms
network operations
network route
outlier detection
network intrusion detection
security of data
computer network security
authorisation
Conferences
Resiliency
pubcrawl
composability
Metrics
security
Databases
Vegetation
Data mining
Intrusion Detection
database management systems
XML
network information
biblio
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
Migration
VM migration
Virtual machining
virtual machines
virtual machine security
virtual machine migration modeling
static security measures
sophisticated methods
Servers
security of data
security mechanism
security
pubcrawl
probability
network topology
model migration
Adaptation models
Markov processes
intrusion
dynamic security measure
dynamic security
dynamic attack surface
destination server parameters
Destination Server
continuous-time Markov Chain model
Computational modeling
complex networks
complex network
cloud environment
cloud computing environment
Cloud Computing
biblio
Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
pattern classification
wrapper feature selection
supervised machine learning technique
supervised learning algorithm
intrusion detection success rate
artificial neural network based machine
intrusion
Predictive Metrics
Signal processing algorithms
Artificial Neural Networks
network traffic
neural network
machine learning techniques
network intrusion detection
security of data
neural nets
deep learning
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Feature Selection
feature extraction
support vector machine
Support vector machines
machine learning algorithms
Classification algorithms
biblio
An Elaborate Comprehensive Survey on Recent Developments in Behaviour Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
Intrusion Detection
telecommunication traffic
survey
security of data
Resiliency
Radio frequency
pubcrawl
network activity
intrusion detection technology
Intrusion Detection Systems
Artificial Neural Networks
intrusion
IDS
detection
data monitoring
composability
Cloud Computing
Classification algorithms
behaviour based intrusion detection systems
behavior
file
A Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms
Submitted by Shouhuai Xu on Tue, 01/07/2020 - 11:46am. Contributors:
Shouhaui Xu
Yanfang Ye
Project Slides
data science
intrusion
detection
1814825
SaTC PI Meeting 2019
biblio
FBG security fence for intrusion detection
Submitted by grigby1 on Mon, 06/11/2018 - 3:26pm
mobile computing
Support vector machines
social networks
security
Resiliency
resilience
pubcrawl
power consumption
photovoltaic power systems
performance evaluation
Optical fibers
Optical fiber sensors
Optical fiber cables
optical fiber
network intrusion detection system
natural language processing
composability
MIS
Metrics
mean square error methods
Management information systems
intrusion
Internet of Things
Fiber gratings
fence
feature extraction
fault diagnosis
Engineering
dissimilarity measure
Data mining
control system synthesis
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
« first
‹ previous
1
2
3
next ›
last »