Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
An Intrusion Detection System Based Secured Electronic Service Delivery Model
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
multifaceted electronic services
government data processing
Banking
Cloud Banking
cloud banking transaction
cloud service model
ICT
identification number
information-and-communication technology
message communication
digital communication
open channel
PINA
privacy-integrity-nonrepudiation-and-authentication information
secured electronic service delivery model
security lapses
single window based cloud service delivery model
Smart card
Repudiation
composability
Cloud Computing
Servers
authorisation
data privacy
Conferences
Resiliency
Human behavior
pubcrawl
intrusion detection system
component
Computational modeling
Metrics
internet
Intrusion Detection
smart cards
unauthorized access
bank data processing
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Secure Integration of Electric Vehicles with the Power Grid
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
power data
cyber-physical
cyber-physical anomaly detection Engine
detects anomalies
distribution networks
EV
monitoring cyber messages
monitors system behavior
pluggable electric vehicles
critical power grid component
power grid system
Power measurement
power measurements
V2G cyber network
Vehicle-to-grid
vehicle-to-grid system
worst case inspection time
Smart Grid Sensors
Inspection
Monitoring
security
Resiliency
pubcrawl
Protocols
Anomaly Detection
distributed energy resources
power system security
Intrusion Detection
distributed power generation
secure integration
Engines
Human Factors
Compositionality
Electric Vehicles
aggregator
battery powered vehicles
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
file
Protecting Cyber Physical Systems Using A Game-Theoretical Approach
Submitted by Mina Guirguis on Wed, 02/05/2020 - 5:15pm. Contributors:
Leander Davis
Mina Guirguis
Posters
cyber-physical systems
Intrusion Detection
Wired Networking
wireless networking
1814064
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
LEADER: Low-Rate Denial-of-Service Attack Defense
Submitted by Jelena Mirkovic on Wed, 02/05/2020 - 5:15pm. Contributors:
Rajat Tandon
Haoda Wang
Nicolaas Weideman
Shushan Arakelyan
Christophe Hauser
Jelena Mirkovic
Posters
Intrusion Detection
Software
1815495
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Characterizing and Modeling Threat Feeds for Patch
Submitted by Ashton on Wed, 02/05/2020 - 5:15pm. Contributor:
Ashton Woiwood
Posters
threat intelligence
Intrusion Detection
Formal Methods and Language-based Security
1715152
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Adversarial Machine Learning Beyond the Image Domain
Submitted by grigby1 on Tue, 01/28/2020 - 2:39pm
Adversarial Machine Learning
composability
Intrusion Detection
machine learning
Neural networks
privacy
pubcrawl
resilience
Resiliency
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »