Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
A Progressive Intrusion Detection System through Event Processing: Challenges and Motivation
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
computer science
system attacks
progressive intrusion detection system
IDS systems
Host and Network IDS
false negative rates
Events Clustering and Aggregation.
event processing
dynamic attacks
Complex Event Processing (CEP)
complex event processing
CEP
intrusion tolerance
security of data
Firewalls (computing)
security threats
Intrusion Detection System (IDS)
Intrusion Detection
Training
internet
composability
pubcrawl
Resiliency
real-time systems
Organizations
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
communication bus
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
controller area network
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
automobiles
Attack detection
Logic gates
safety-critical software
simulation
Intrusion Detection
testing
Roads
pubcrawl
Resiliency
cyber-physical systems
telecommunication security
Internet of Things
traffic engineering computing
security of data
Automotive engineering
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
radar detection
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
Transmission line measurements
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
sensors
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
Intrusion Detection
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »