Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network data
biblio
Network Cluster Reliability with Enhanced Security and Privacy of IoT Data for Anomaly Detection Using a Deep Learning Model
Submitted by grigby1 on Fri, 12/09/2022 - 5:10pm
Data Security
Resiliency
resilience
pubcrawl
Predictive models
performance enhancement
network data
Metrics
Internet of Things
deep learning
CPS
data privacy
Data models
cyber physical systems
Computational modeling
composability
Anomaly Detection
actuator security
privacy
biblio
CoDRL: Intelligent Packet Routing in SDN Using Convolutional Deep Reinforcement Learning
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
routing configuration
network performance
Packet loss rate
pubcrawl
q-learning
real-time modification
resilience
Resiliency
resource allocation
routing computation
network data
routing optimization
routing strategies
Scalability
SDN controller
Software Defined Network (SDN)
software defined networking
telecommunication control
telecommunication network routing
telecommunication traffic
deep reinforcement learning agent
Convolution layer
Convolutional Deep Reinforcement Learning
convolutional layer
convolutional neural nets
coupled congestion control
current SDN systems
Deep Deterministic Policy Gradient (DDPG)
Deep Deterministic Policy Gradients deep agent
deep reinforcement learning
CoDRL model
dynamic packet routing
dynamic traffic engineering
flexible traffic engineering
gradient methods
intelligent packet routing
less efficient resource utilization
mean network delay
network congestion
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
Model-based simulation and threat analysis of in-vehicle networks
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
intelligent navigation
automated controls
automobile industry
automotive systems
connectivity interfaces
Controller area network (CAN)
cyber-security risks
driving experience
in-vehicle features
in-vehicle networks
air pollution
model-based design
network simulation
operational errors
rapid pace
safety systems
SDN technologies
security assessment
software defined networking technologies
threat analysis
vehicular ad hoc networks
security of data
computer network security
Internet of Things
real-time systems
Time measurement
software defined networking
cyber-physical systems
Resiliency
pubcrawl
IoT
security threats
sensors
Threat Landscape
security risks
Atmospheric modeling
controller area network security
power control
network data
adequate testing
biblio
Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
learning (artificial intelligence)
Software Defined Security
software defined networking
security protection methods
security data platform
Scalable Security
scalable network anomaly detection module
Scalability
Resiliency
real-time online detection
real-time online anomaly detection
pubcrawl
Network Security Architecture
network data
network attack technology
network anomaly detection technology
Metrics
internet
hypermedia
deep learning-based network anomaly detection module
deep learning
data-driven software defined security architecture
data-driven security business orchestration
data-driven orchestration engine
data driven security business orchestration
computer network security
Big Data technology
Big Data
anomaly detection algorithm module
Dynamic Networks and Security
composability
biblio
Adaptive Root Cause Analysis for Self-Healing in 5G Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:21pm
return on investment
network data
network experts
pattern classification
probabilistic Bayesian classifier
probability combinations
probable root cause
pubcrawl
quality of service
RCA process
resilience
Resiliency
Manuals
ROI
Root cause analysis
self-healing
self-healing networks
self-organising feature maps
self-organizing network
SH
SON based solutions
stratified synthesized data
telecommunication computing
Cellular networks
5G mobile communication
5G networks
adaptive learning
adaptive root cause analysis
adaptive systems
ARCA
automated evidence based RCA
automated fault detection
Bayes methods
Bayesian network theory
belief networks
5G
composability
domain knowledge reuse
fault detection
fault diagnosis
fault tolerant computing
Incomplete Data
learning (artificial intelligence)
Long Term Evolution
LTE Advanced
LTE-A
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 11:36am
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)