Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic analysis
biblio
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks
Submitted by grigby1 on Tue, 01/11/2022 - 10:34am
adversarial learning
attack surface
denial-of-service attack
face recognition
feature extraction
Intrusion Detection
machine learning
Metrics
network traffic analysis
Perturbation methods
pubcrawl
resilience
Resiliency
Roads
Scalability
telecommunication traffic
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
IoT
telecommunication traffic
Scalability
Resiliency
pubcrawl
network traffic analysis
network traffic
network security
network provider
network attacks
IoT traffic
computer network security
Intrusion Detection
Internet of Things
information protocol.
Hurst parameter
Hurst flow parameter
DPI software system
dpi
deep packet inspection system
deep packet inspection
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Weakness Identification and Flow Analysis Based on Tor Network
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
Router Systems Security
darknet
Human behavior
Metrics
network traffic analysis
policy-based governance
pubcrawl
resilience
security weaknesses
SVM
The Onion Router
biblio
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Anomaly Detection
cyber-physical systems
Fuzzy logic
fuzzy logical inference
Metrics
network traffic analysis
pubcrawl
resilience
Resiliency
security
security risk analysis
biblio
Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic?
Submitted by grigby1 on Mon, 04/24/2017 - 11:39am
Android apps
anonymity
anonymity in wireless networks
composability
deep packet inspection
Human behavior
Metrics
network traffic analysis
privacy
pubcrawl
Resiliency
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 1:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk