Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Application of Optimized Bidirectional Generative Adversarial Network in ICS Intrusion Detection
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
optimal model
Training
supervised control
single variable principle
security of data
Scalability
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
parameter optimization
optimized BiGAN
optimized bidirectional generative adversarial network
optimization
optimisation
network intrusion detection
neural nets
massive network traffic data
Intrusion Detection
integrated circuits
Industrial Control Systems
industrial control system
industrial control
ICS intrusion detection method
high-dimensional network traffic data
generative adversarial networks
data acquisition
control system security
control engineering computing
Computational modeling
BiGAN
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
performance indicator metrics
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
K-NN
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
hybrid feature selection
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
API
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
biblio
Hybrid Technique of Genetic Algorithm and Extended Diffie-Hellman Algorithm used for Intrusion Detection in Cloud
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
genetic algorithm
threat
security of data
Resiliency
resilience
pubcrawl
malicious insiders
Intrusion Detection
insecure APIs
information breaches
hybridization
genetic algorithms
API
Extension in Diffie-Hellman algorithm
extended Diffie-Hellman algorithm
Denial of Services (DOS)
data thrashing
data storage
Compositionality
cloud transmission
Cloud Computing
application programming interface
application program interfaces
APIs
biblio
Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion
Submitted by grigby1 on Mon, 01/11/2021 - 1:58pm
pubcrawl
multithreaded media input streams
neural nets
neural network deep-learning model
NVIDIA GeForce GTX 1080
NVIDIA GeForce RTX 2070 Max-Q Design
physical intrusion
physical security detectors
physical security sensors
proactive protection
modern critical infrastructures
real-time threat identification
Region based Fully Connected Neural Network (RFCN)
remotely operated vehicles
resilience
Resiliency
Scalability
security of data
video analytics solution
Vulnerability
drone detection
continuous stream
critical infrastructure operators
critical infrastructure security
critical infrastructures
cyber incidents
deep video
Deep-learning
DEFENDER project
distributed cyber-physical systems
complex cyber-physical systems
early stage threat detection
fast restoration
human intruders
human intrusion
Intrusion Detection
learning (artificial intelligence)
Media Data
Metrics
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
IoT
telecommunication traffic
Scalability
Resiliency
pubcrawl
network traffic analysis
network traffic
network security
network provider
network attacks
IoT traffic
computer network security
Intrusion Detection
Internet of Things
information protocol.
Hurst parameter
Hurst flow parameter
DPI software system
dpi
deep packet inspection system
deep packet inspection
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
Modbus-TCP vulnerability
Industrial Control Systems
industrial firewall
Information Assurance
Intrusion Detection
Intrusion Detection and Prevention System
IP networks
malicious parameter command injection
Modbus TCP/IP protocol
industrial control and automation system security
Modbus/TCP
prevention systems
pubcrawl
real-time communication
refinery control
Scalability
transport protocols
DPI industrial firewall
Resiliency
composability
Predictive Metrics
attack mitigation
command injection attacks
deep packet inspection
denial of service attack
DPI capabilities
Networked Control Systems Security
firewalls
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control
biblio
Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
Intrusion Detection
RPL
pubcrawl
composability
6LoWPAN
Internet of Things
wormhole attack
Resiliency
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »