Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Immune system
biblio
NSNN Algorithm Performance with Different Neural Network Architectures
Submitted by aekwall on Thu, 09/30/2021 - 11:53am
Biological neural networks
negative selection
Immune system
Neural Network Security
intrusion detection system
Neural networks
Neurons
Classification algorithms
policy-based governance
IoT
Artificial Neural Networks
cyber-physical systems
Resiliency
Metrics
pubcrawl
Intrusion Detection
computer architecture
biblio
A Human Immunity Inspired Intrusion Detection System to Search for Infections in an Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
human immunity inspired intrusion detection system
Windows Operating System Security
Windows operating system
security of data
security
receptors
operating systems (computers)
operating system
negative selection algorithm
microsoft windows
intrusion detection system
Intrusion Detection
Immune system
Operating systems security
Containers
computer software
computer security
composability
artificial immune system
Anomaly Detection
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
layered-security
wearables security
Wearable Device
Ubiquitous Computing Security
security threats
security of data
security mechanisms
Scalability
Resiliency
pubcrawl
privacy
Metrics
Medical services
medical field
layered-security model
data privacy
IoT
IoMT
Internet of Things
internet of medical things
information security
Industries
Immune system
immune information security
Human Factors
Human behavior
healthcare industry
health care
Device-Connect-Manage
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
genetic algorithms
TSK+ fuzzy inference system
TSK+
Statistics
Sociology
Resiliency
pubcrawl
pattern classification
pathogenic associated molecular pattern
network intrusion detection
Mutual information
Intrusion Detection Systems
immune-inspired classification algorithm
Immune system
Anomaly Detection
Fuzzy sets
fuzzy reasoning
Fuzzy logic
Fuzzy inference systems
feature extraction
dendritic cell algorithm enhancement
Dendritic cell algorithm
danger theory
computer networks
computer network security
composability
artificial immune systems
artificial immune system
biblio
Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
dendritic cells
TC agent
Resiliency
pubcrawl
network packets
multiagents system
multi-agent systems
machine learning
Learning systems
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Immune system
host-based intrusion detection systems
AAIDS
dendritic cell
DC agent
danger theory
computer network security
Computer hacking
Computational modeling
composability
artificial immune systems
artificial immune system
agent-based artificial immune systems
AG agent
adaptable agent-based IDS
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
security
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
PAMP
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
Immune system
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
nodes act
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
1
2
next ›
last »