Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false positive rate
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Improving Performance of Collaborative Source-Side DDoS Attack Detection
Submitted by grigby1 on Tue, 02/16/2021 - 12:57pm
false positive rate
weighted detection results
telecommunication traffic
source-side detection
source-side Denial-of-Service
security
SDN IDPS
Resiliency
resilience
pubcrawl
network security
Metrics
individual attack detection
Human behavior
collaboration
distributed denial-of-service attacks
detection methods
detecting performance
denial-of-service attack
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
Communication networks
Collaborative Source-side detection
collaborative source-side DDoS attack detection method
collaborative attack detection technique
biblio
Detecting Adversarial Examples for Deep Neural Networks via Layer Directed Discriminative Noise Injection
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
machine learning
Training
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Perturbation methods
noninvasive universal perturbation attack
Neural networks
natural scenes
natural images
MobileNet
adversarial examples
learning (artificial intelligence)
layer directed discriminative noise
false trust
false positive rate
dominant layers
distortion
discriminative noise injection strategy
deep neural networks
deep learning
convolutional neural nets
computer vision tasks
computer vision
computer architecture
adversarial images
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
A graph theoretic approach to fast and accurate malware detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
Malware Analysis
unknown malware
storage space
storage management
Robustness
Resiliency
resilience
pubcrawl
privacy
obfuscation attacks
nonsignature malware detection schemes
Metrics
Markov processes
benign software
malware
invasive software
Human behavior
GZero
graph theory
graph theoretic approach
feature extraction
false positive rate
detection time
Databases
Complexity theory
biblio
A New Bloom Filter Structure for Searchable Encryption Schemes
Submitted by K_Hooper on Wed, 02/14/2018 - 12:08pm
Bloom filter
composability
Cryptographic Hash Function
false positive rate
pubcrawl
Resiliency
searchable encryption
biblio
Collaborative Anomaly Detection Framework for Handling Big Data of Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Interquartile Range (IQR)
UNSW-NB15 dataset
ubiquitous computing
security of data
Scalability
Resiliency
pubcrawl
pay-per-use based services
network observations
Metrics
Large-scale systems
Big Data
Gaussian Mixture Model (GMM)
false positive rate
dynamic distributed architecture
detection rate
data privacy
Collaborative anomaly detection framework
cloud computing environments
Cloud Computing
CADF
big data security in the cloud
biblio
XSS detection with automatic view isolation on online social network
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
social networking (online)
OSN
OSN-based Web application
pubcrawl
Radio frequency
Request Authentication
Resiliency
security of data
Session
online social network
string value extraction
Uniform resource locators
Web page
XSS attack vector repository
XSS attack vectors
XSS cheat sheet
XSS detection
authentication
malicious code
Isolators
internet
Humhub
Human behavior
false positive rate
false negatives rate
Decision support systems
Cross-site scripting (XSS)
cross-site scripting
Cross Site Scripting
Consumer electronics
Conferences
composability
automatic view isolation
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis