Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anomaly detection system
biblio
An Artificial Neural Network Based Anomaly Detection Method in CAN Bus Messages in Vehicles
Submitted by grigby1 on Mon, 01/10/2022 - 12:32pm
collaboration
security
resilience
pubcrawl
policy-based governance
Metrics
mechatronics
intrusion detecting system
encryption
deep learning
cyber physical systems
Computer hacking
controller area network security
CAR security
CAN
automobiles
authentication
Artificial Neural Networks
artificial neural network
anomaly detection system
Internet of Things
Resiliency
cyber-physical systems
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models
Submitted by grigby1 on Thu, 04/20/2017 - 12:42pm
anomaly detection system
insider threat
machine learning
Network reconnaissance
pubcrawl
Resiliency