Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signature based defense
biblio
A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud
Submitted by aekwall on Mon, 11/29/2021 - 2:02pm
Monitoring
Intrusion Detection
Cloud Computing
Servers
Computer crime
pubcrawl
Scalability
Resiliency
malware
intrusion detection system
anomaly based IDS
Signature based IDS
signature based defense
biblio
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Submitted by aekwall on Mon, 11/29/2021 - 1:59pm
Computational modeling
Data models
Perturbation methods
Training
Servers
Containers
pubcrawl
Scalability
Resiliency
Adversarial Machine Learning
data privacy
blacklisting
domain generation algorithms
Long short-term memory
signature based defense
biblio
Research on MR virtual scene location method based on image recognition
Submitted by aekwall on Mon, 11/29/2021 - 1:59pm
Gold
pubcrawl
Scalability
Resiliency
ACE
image recognition
mixed reality
Virtual scene registration
Vuforia
signature based defense
biblio
IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment
Submitted by aekwall on Tue, 08/17/2021 - 4:05pm
machine learning
Training
Traffic classification
Systems architecture
security
Resiliency
pubcrawl
policy-based governance
network function virtualization
Metrics
signature based defense
ipv6 security
IPv6
Intrusion Detection
IDS
Decision Tree
composability
Communication networks
Scalability
biblio
Proposing Innovative Intruder Detection System for Host Machines in Cloud Computing
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
intruder detection system
Virtualization
Virtual machining
virtual machine security
virtual machine
Technological innovation
signature
security
Resiliency
resilience
pubcrawl
Prevention
Intrusion Detection
signature based defense
IDS
host machine
Engines
Cyber Physical System
Cryptography
composability
Cloud Computing
attack
Anomaly
alerts
Scalability
biblio
Artificial Neural Networks Optimized with Unsupervised Clustering for IDS Classification
Submitted by grigby1 on Thu, 03/12/2020 - 12:03pm
Artificial Neural Networks
Classification algorithms
Clustering algorithms
Data models
Intrusion Detection
machine learning
pubcrawl
resilience
Resiliency
Scalability
signature based defense
Support vector machines
Traffic classification
x-means
biblio
One-Shot Malware Outbreak Detection Using Spatio-Temporal Isomorphic Dynamic Features
Submitted by grigby1 on Thu, 03/12/2020 - 12:03pm
invasive software
Training
spatio-temporal isomorphic dynamic features
scarce number
Scalability
Resiliency
resilience
one-shot malware outbreak detection
Mathematical model
malware
machine learning algorithm
learning (artificial intelligence)
signature based defense
Generative Adversarial Autoencoder
feature extraction
Dynamic Malware outbreak detection
dynamic malware detection
dynamic execution patterns
dynamic detection
deep learning
behavioural signature
Behavioural detection
Banking
pubcrawl
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
IC
signature based defense
security guarantees
Scalability
Resiliency
resilience
relaxed notion
pubcrawl
original circuit
microscopy
malicious foundry
long-standing hardness assumptions
logic locking
learning (artificial intelligence)
Integrated circuit modeling
Integrated Circuit Camouflaging
Adversary Models
Foundries
formally defined notions
formal approach
exponentially approximation-resilient
exact-recovery-resiliency
digital signatures
Cryptography
Computational modeling
cL
Boolean functions
boolean circuits
benchmark circuits
approximation-resilient Circuit locking
approximation-resiliency
algorithmic attacks
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
named data network
tools
telecommunication network topology
telecommunication network routing
telecommunication channels
signature based defense
side-channel timing response
side-channel timing attack
Scalability
Resiliency
resilience
pubcrawl
privacy
NDN
Named Data Network Security
Attack detection
IP networks
internet
delays
data privacy
Cryptography
countermeasure methods
content privacy
consumer privacy
computer network security
Cathode ray tubes
cache storage
brute force timing attack
brute force attack model
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
« first
‹ previous
1
2
3
4
5
6
next ›
last »