Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristics
biblio
IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning
Submitted by grigby1 on Fri, 01/13/2023 - 12:28pm
Adaptation models
feature extraction
machine learning
machine learning algorithms
IoT
pubcrawl
resilience
Resiliency
Scalability
Protocols
network security
DDoS
Decision Tree
denial-of-service attack
Security Heuristics
Heuristics
biblio
Exact and approximation algorithms for sensor placement against DDoS attacks
Submitted by aekwall on Tue, 04/27/2021 - 12:35pm
DDoS
Scalability
Resiliency
pubcrawl
sensor placement
Security Heuristics
predictability
Heuristics
minimum multicut
network safety optimization
biblio
A Rule Reordering Method via Pairing Dependent Rules
Submitted by aekwall on Tue, 04/27/2021 - 12:35pm
Scalability
Conferences
security
Resiliency
pubcrawl
optimization
Communication networks
Heuristic algorithms
Security Heuristics
predictability
merging
Information services
packet classification
Heuristics
optimal rule ordering
biblio
liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 12:36pm
multipath forwarding
computing devices
conventional NDN forwarding
cooperative forwarding strategy
data retrieval latency
data significance
forwarding strategy
Heuristics
liteNDN
caching policy
NDN networks
NDN routers
network utilization
packet forwarding decisions
probability estimation
QoS-aware packet caching
QoS-aware packet forwarding
routing costs
named data networking
telecommunication traffic
Data Security
Resiliency
Human behavior
pubcrawl
internet
telecommunication network routing
quality of service
Scalability
network communication
cache storage
named data networks
in-network caching
data retrieval
cache hit rate
caching normal
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
Developing Accessible and Usable Security (ACCUS) Heuristics
Submitted by grigby1 on Mon, 07/01/2019 - 9:06am
expert systems
security
accessibility
expert evaluation
Heuristics
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
Usable Security
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 9:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 10:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
Detecting Phishing Websites Using Automation of Human Behavior
Submitted by grigby1 on Mon, 03/26/2018 - 12:13pm
Anti-phishing
automation
composability
defense
Heuristics
Metrics
Phishing
pubcrawl
Resiliency
selenium
Zero day attacks
1
2
next ›
last »