Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
legitimate users
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 3:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
Robust Chaos-Based Information Masking Polar Coding Scheme for Wiretap Channel in Practical Wireless Systems
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
flat-fading Rayleigh channels
polar codes
telecommunication network reliability
Channel models
bit-channels
secure polar coding scheme
legitimate users
polar coding scheme
eavesdropping channel conditions
channel polarization
legitimate channels
realistic channel conditions
reliability performances
robust chaos-based information masking
security performances
transmission conditions
wireless communication systems
telecommunication security
Rayleigh channels
AWGN channels
wireless channels
chaotic communication
encoding
wiretap channel
channel coding
Reliability
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
security
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Frozen Bit Selection Scheme for Polar Coding Combined with Physical Layer Security
Submitted by grigby1 on Wed, 11/27/2019 - 2:01pm
Metrics
wiretap channel
telecommunication security
symmetric α-stable distribution
security
secrecy rate
Resiliency
resilience
Receivers
pubcrawl
Protocols
polar coding scheme
polar codes
physical layer security
channel coding
legitimate users
impulsive noise
frozen bit selection scheme
frozen bit
error statistics
eavesdropper
density evolution
Decoding
composability
bit-error rate
BER
Automatic repeat request
ARQ protocol
biblio
A Security Framework for ICN Traffic Management
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
ICN attacks
Traffic Management
security solutions
security framework
Routing
Resiliency
resilience
pubcrawl
privacy component
privacy
legitimate users
internet
information centric networking
ICN traffic management
ICN communication model
Access Control
ICN architectures
ICN
framework components
data privacy
data objects
data integrity
content popularities
computer network security
Computer crime
computer architecture
composability
Autonomic Security
authorisation
access control component
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 12:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Leveraging Time for Spammers Detection on Twitter
Submitted by grigby1 on Tue, 09/19/2017 - 11:06am
honeypot
Human behavior
legitimate users
machine learning
Metrics
pubcrawl
Scalability
spam
spam detection
Time