Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat vectors
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Internet of Things
threat vectors
software-defined networking
software defined networking
sequential decision making problems
SDN
Scalability
RL-based threat mitigation
resilience
Reinforcement learning
pubcrawl
neural fitted Q-learning agent
network security management
network behaviour
machine learning
learning (artificial intelligence)
threat mitigation
global network view
Decision Making
computer networks
computer network security
autonomous threat mitigation
autonomous network systems
ATMoS
APT
advanced persistent threat
ad-hoc solutions
active threat mitigation
Human behavior
Metrics
Resiliency
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Re-Using Enterprise Architecture Repositories for Agile Threat Modeling
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
Agile development
design structure matrix
Enterprise Architecture
Measurement
Metrics
privacy
pubcrawl
Threat Modeling
threat vectors
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »