Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern matching
biblio
Malware Subspecies Detection Method by Suffix Arrays and Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 4:46pm
privacy
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
information security
static analysis
malware
malware detection
virtual environments
Malware Analysis
pattern matching
biblio
Seeking the Shape of Sound: An Adaptive Framework for Learning Voice-Face Association
Submitted by grigby1 on Mon, 12/20/2021 - 2:40pm
adaptive filtering
ART
computer vision
face recognition
Filtering
matched filters
Metrics
pattern matching
pubcrawl
resilience
Resiliency
Scalability
Shape
biblio
Application of the Aho-Corasick algorithm to create a network intrusion detection system
Submitted by grigby1 on Tue, 05/25/2021 - 3:25pm
Memory management
Throughput
Scalability
Resilient
resilience
pubcrawl
precise matching
pattern matching
NIDS
network intrusion detection
Metrics
algorithm Aho-Corasick
information science
imprecise matching
Human Factors
Human behavior
Hardware
FPGA
field programmable gate arrays
cryptology
composability
collaboration
biblio
Cost-efficient Integration Process Placement in Multiclouds
Submitted by aekwall on Tue, 04/27/2021 - 1:34pm
Random access memory
Process Placement
Multicloud
Integration Patterns
Cost efficient
Application Integration
predictability
Security Heuristics
contracts
Scalability
Containers
pattern matching
Routing
pubcrawl
Resiliency
security
Runtime
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
Poster: Novel Opportunities in Design of Efficient Deep Packet Inspection Engines
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
Inspection
Scalability
Memory management
security
Resiliency
pubcrawl
pattern matching
automata
Engines
deep packet inspection
Pathology
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
1
2
3
4
next ›
last »