Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network packets
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
dendritic cells
TC agent
Resiliency
pubcrawl
network packets
multiagents system
multi-agent systems
machine learning
Learning systems
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Immune system
host-based intrusion detection systems
AAIDS
dendritic cell
DC agent
danger theory
computer network security
Computer hacking
Computational modeling
composability
artificial immune systems
artificial immune system
agent-based artificial immune systems
AG agent
adaptable agent-based IDS
biblio
Network parameters applicable in detection of infrastructure level DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
network packets
Traffic flow
telecommunication traffic
resource availability
Resiliency
pubcrawl
Protocols
Ports (Computers)
network security
Anomaly Detection
Metrics
IP networks
Human behavior
Entropy
Electronic mail
DDoS attack detection
Computer crime
composability