Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Feature Popularity Between Different Web Attacks with Supervised Feature Selection Rankers
Submitted by grigby1 on Tue, 06/14/2022 - 1:13pm
Measurement
Web attacks
feature similarity
Feature Popularity
Feature Selection
big data security metrics
Intrusion Detection
SQL injection
Force
machine learning
Big Data
Scalability
Radio frequency
Conferences
Resiliency
resilience
pubcrawl
biblio
Detecting SSH and FTP Brute Force Attacks in Big Data
Submitted by grigby1 on Tue, 06/14/2022 - 1:11pm
Cyber-security
Brute-force Attack
big data security metrics
statistical analysis
CSE-CIC-IDS2018
Decision Tree
Intrusion Detection
Force
Classification algorithms
feature extraction
Big Data
telecommunication traffic
Data models
Scalability
Resiliency
resilience
pubcrawl
biblio
Modelling Trust Frameworks for Network-IDS
Submitted by grigby1 on Thu, 06/09/2022 - 2:58pm
security
Servers
Intrusion Detection
pubcrawl
Human behavior
network security
fuzzing
traffic control
trust
network intrusion detection
human trust
biblio
A Study on Advancement in Honeypot based Network Security Model
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
Time factors
TCP-Stack-Fingerprint
Square expectation mistake(SPE)
modern honey network
Resiliency
honeypot
honey pots
Human Factors
Technological innovation
cyberattack
feature extraction
Intrusion Detection System (IDS)
SCADA
Load modeling
Scalability
resilience
pubcrawl
Intrusion Detection
security
biblio
Internet of Things Attack Group Identification Model Combined with Spectral Clustering
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
Human Factors
spectral clustering
attacker portrait
attack group
aggressive behavior
Resiliency
Image analysis
honey pots
Honey pot (computing)
Intrusion Detection
IoT security
Clustering algorithms
Benchmark testing
Data models
Scalability
Conferences
resilience
pubcrawl
biblio
Intrusion Detection System (DBN-IDS) for IoT using Optimization Enabled Deep Belief Neural Network
Submitted by grigby1 on Thu, 06/09/2022 - 2:29pm
resilience
FPR
FNR
intrusion tolerance
DBN
Intrusion Detection Systems
Accuracy
Training data
Resiliency
computer architecture
Human Factors
pubcrawl
Intrusion Detection
Neural networks
Organizations
Training
deep learning
biblio
Research on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System
Submitted by aekwall on Thu, 06/09/2022 - 11:40am
industrial control
scalable systems
Wind farms
wind farm
security strategies
Key Technologies
Industrial Control Systems(ICS)
mechatronics
Solid modeling
Intrusion Detection
network security
Cybersecurity
Industrial Control Systems
power grids
Resiliency
Scalability
pubcrawl
biblio
Determination of the Optimal Ratio of Normal to Anomalous Points in the Problem of Detecting Anomalies in the Work of Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:38am
information security
scalable systems
Scalability
Resiliency
pubcrawl
power systems
machine learning
Intrusion Detection
integrated circuits
ICS Anomaly Detection
industrial control systems (ICS)
Industrial Control Systems
industrial control
high-speed networks
feature extraction
deep learning
control systems
autoencoders
biblio
Applying the Experience of Artificial Intelligence Methods for Information Systems Cyber Protection at Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:38am
Intrusion Detection
Artificial Intelligence
standardization
pubcrawl
Scalability
Resiliency
Industrial Control Systems
Instruments
Market research
industrial control
Cyber-security
fourth industrial revolution
interoperability
IT/OT convergence
scalable systems
biblio
IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
Submitted by aekwall on Thu, 06/09/2022 - 11:07am
Intrusion Detection
Internet of Things
tools
Conferences
Resiliency
composability
testing
Performance analysis
Cybersecurity
intrusion detection system
denial of service
Web servers
pubcrawl
IDS
Anomaly-based
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »