Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Overview Of Vanet Network Security
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
VANET
vehicular
V2I.
Human Factors
black hole
quality assurance
mathematical models
V2V
IoV
information science
Trajectory
vehicular ad hoc networks
Compositionality
information security
network security
composability
Information Assurance
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Research on Information Security Protection of Industrial Internet Oriented CNC System
Submitted by grigby1 on Thu, 08/24/2023 - 3:01pm
network security
security protection scheme
information security protection
CNC system information security protection
industrial internet
Productivity
machine tools
Industrial Control Systems
Data Security
information security
industrial control system
internet
authentication
Scalability
Resiliency
resilience
pubcrawl
biblio
Research on network security behavior audit method of power industrial control system operation support cloud platform based on FP-Growth association rule algorithm
Submitted by grigby1 on Thu, 08/24/2023 - 3:00pm
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
industrial control
industrial control system
network security
maintenance engineering
Classification algorithms
cloud platform
Industrial Control Systems
Systems operation
Behavioral sciences
automated audit method
FP-Growth association rule algorithm
biblio
Research on industrial Robot system security based on Industrial Internet Platform
Submitted by grigby1 on Thu, 08/24/2023 - 2:59pm
programming
industrial robots
Industrial Internet Platform
threat analysis
Robot vision systems
Service robots
Industrial Control Systems
system security
maintenance engineering
pubcrawl
Production
industrial control system
industrial control
Scalability
network security
Resiliency
resilience
biblio
Research on Intelligent Network Operation Management System Based on Anomaly Detection and Time Series Forecasting Algorithms
Submitted by grigby1 on Wed, 08/23/2023 - 3:35pm
Anomaly Detection
pubcrawl
Scalability
network security
Prediction algorithms
operating systems
Software algorithms
Time series analysis
Time Series Prediction
Telecommunications
network operation
i-o systems security
Software Architecture
Intelligent networks
biblio
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
pubcrawl
resilience
Resiliency
telecommunication traffic
composability
Benchmark testing
network security
Complexity theory
documentation
network intrusion detection
IDS
Labeling
datasets
CIC-IDS-2017
CSE-CIC-IDS-2018
network intrusion
biblio
Usage of Classifier Ensemble for Security Enrichment in IDS
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
Intrusion Detection
pubcrawl
resilience
Resiliency
standards
composability
network security
renewable energy sources
computer networks
IDS
automation
classification
intrusion
threat
biblio
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm
Submitted by grigby1 on Wed, 08/16/2023 - 3:39pm
IDS
Sequential event patterns
security events
probabilistic attack prediction
knowledge based anomaly detection
IPAM
Intrusion detection by Event Analysis
Generalized Sequential Patterns (GSP)
CSE-CIC-IDS 2018 data set
Behavioral sciences
Intelligent systems
feature extraction
Prediction algorithms
network security
DDoS Attacks
Benchmark testing
composability
Data models
Resiliency
resilience
pubcrawl
security
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
biblio
Traceability Method of Network Attack Based on Evolutionary Game
Submitted by grigby1 on Fri, 08/04/2023 - 11:16am
Stability analysis
traceback
replicator dynamics
attack and defense strategy
Evolutionary Game
Behavioral sciences
game theoretic security
Learning systems
Cyberspace
pubcrawl
Games
network security
Scalability
Analytical models
Metrics
Human Factors
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »