Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet users
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
biblio
A Robust TCP-SYN Flood Mitigation Scheme Using Machine Learning Based on SDN
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
security
pubcrawl
resilience
Resiliency
resource overload
robust TCP-SYN flood mitigation scheme
SDN
SDN controller
SDN networks
networking technology
security device
Software Define Networking
software defined networking
system stop
TCP-SYN flood attack mitigation
TCP-SYN Flood Mitigation
threat mitigation
centralized management
network operators
mitigation methods
Metrics
machine learning
learning (artificial intelligence)
KNN
Internet users
internet
Human Factors
Human behavior
flexible processing
DDoS
computer network security
computer network management
complex security algorithms
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
A Practical Approach to Answer Extraction for Constructing QA Solution
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
high-quality answers
Metadata Discovery Problem
Yahoo
support sets
straight lexical gaps
semantic gaps
search engines
RCAS
question-answer pairs
question answering system
Query Extension
QA solution construction
Portals
modern agricultural field
information extraction
Scalability
candidate answers
answer quality assessment
answer extraction
Agriculture
agricultural expert
question answering (information retrieval)
Knowledge Discovery
Semantics
metadata
Internet users
internet
composability
pubcrawl
Resiliency
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling