Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
Intrusion detection for Internet of Things applying metagenome fast analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
Intrusion Detection
Task Analysis
Resiliency
resilience
pubcrawl
Metrics
metagenome
manet attack prevention
malware
bioinformatics
Internet of Things
information security
genomics
DNA
de Bruijn graph
Databases
Compositionality
biblio
An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 12:01pm
Routing protocols
Location Privacy in Wireless Networks
wireless multimedia sensor networks
unobservability scheme
Source/Sink Location Anonymity
multimedia processing technique
location privacy scheme
Global Attacks
cross-layer design
Contextual Privacy
Image Processing
Multimedia communication
Compositionality
energy consumption
authentication
delays
Intrusion Detection
multipath routing
telecommunication network routing
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data encryption
security
data privacy
Cryptography
authorisation
biblio
Performance Enhancement of Snort IDS through Kernel Modification
Submitted by aekwall on Mon, 10/26/2020 - 11:47am
NAPI throughput
telecommunication traffic
Task Analysis
Snort performance
snort packet handling capacity
Snort IDS
security of data
Resiliency
pubcrawl
Predictive Metrics
performance enhancement metrics
performance enhancement
Packet loss
operating system kernels
open-source intrusion detection system
composability
NAPI packet reception mechanism
Monitoring
Metrics
Measurement
Linux Operating System Security
Linux key parameters
Linux kernel networking subsystem
Linux
Kernel subsystem
kernel modifications
Kernel modification
Kernel
Intrusion Detection
high traffic load
biblio
An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
Internet of Vehicle
wireless sensor networks
vehicular ad hoc networks
telecommunication traffic
security issues
Resiliency
pubcrawl
packet header analysis
network attacks
Metrics
low-powered embedded vehicle terminal
Kernel
Intrusion Detection System (IDS)
Intrusion Detection
Internet of Vehicles intrusion detection system
Internet of Vehicles
automobiles
internet
information security
IDS
Human Factors
Human behavior
feature extraction
cyber physical systems
Cryptography
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
convolutional neural nets
convolution
computer network security
car network
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Intrusion Detection Method of Industrial Control System Based on RIPCA-OCSVM
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
particle swarm optimisation
Support vector machines
single classification problem
security of data
Scalability
Robust Incremental Principal Component Analysis
RIPCA-OCSVM
RIPCA algorithm
RIPCA
Resiliency
resilience
pubcrawl
Protocols
principal component analysis
pattern classification
Anomaly Detection
outlier
one-class support vector machine
OCSVM
learning (artificial intelligence)
Intrusion Detection
integrated circuits
industrial data sets
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
anomaly intrusion detection algorithm
anomaly detection model
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
multiclassification support vector machine
Training
Support vector machines
stacked auto-encoder
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
pattern classification
neural nets
network data feature extraction
Analytical models
Multi-classification support vector machine
intrusion detection model
Intrusion Detection
Internet technologies
industrial production
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
Data models
Anomaly Detection
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »