Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
An Intrusion Detection System using Opposition based Particle Swarm Optimization Algorithm and PNN
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
probability
Probabilistic Neural Network
OPSO
NSL KDD dataset
intrusion detection models
IDS model
feedforward neural net algorithms
Feed Forward Network
artificial neural network
ANN
NSL-KDD dataset
Compositionality
feedforward neural nets
Biological neural networks
Artificial Neural Networks
security of data
Intrusion Detection
Feeds
Neurons
Swarm Intelligence
particle swarm optimization algorithm
particle swarm optimization
particle swarm optimisation
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
network security
intrusion detection system
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Developing Battery of Vulnerability Tests for Industrial Control Systems
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Integrated circuit modeling
vulnerability tests
test environment
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
intrusion prevention systems
Intrusion Detection Systems
Intrusion Detection
Industrial Control Systems Anomaly Detection
information security
Industrial Control Systems
industrial control
Industrial Communication
IEC standards
ICS/IDS systems
ICS networks
ICS area
data generator
control engineering computing
connected environment
computer network security
attack vector
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
biblio
Research on Block Chain Network Intrusion Detection System
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
intrusion tolerance
WLAN
Wireless communication
system security
Resiliency
resilience
pubcrawl
network intrusion detection
network intrusion
Monitoring
Metrics
Block Chain
Intrusion Detection Systems
Intrusion Detection
detection system
computer network security
composability
Communication system security
blockchain
block chain network intrusion security
block chain network intrusion privacy
block chain network intrusion detection system
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
Intrusion Detection Systems with Deep Learning: A Systematic Mapping Study
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
Intrusion Detection Systems
Systematics
systematic mapping study
systematic mapping method
security of data
Resiliency
pubcrawl
neural nets
learning (artificial intelligence)
Artificial Neural Networks
Intrusion Detection
deep learning algorithms
deep learning
Databases
Computational modeling
composability
Classification algorithms
biblio
A Novel Intrusion Detection Method for Internet of Things
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
intrusion attacks
security of data
optimal network structure
Neurons
network intrusion detection
Metrics
IoT technology
IoT system
IoT networks
Intrusion Detection Systems
intrusion detection model
intrusion detection method
Intrusion Detection
belief networks
Internet of Things era
Internet of Things
genetic algorithms
Embedded System
deep learning
Deep Belief Network
DBN
Biological cells
Artificial Neural Networks
Resiliency
composability
pubcrawl
biblio
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
IDS
shared key encryption
Servers
response scheme
response ability
Resiliency
network intrusion detection system
intrusion response system
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
Internet of Things
pubcrawl
group encryption
encryption
Cryptography
CP-ABE-encrypted IoT networks
CP-ABE
computer architecture
composability
ciphertext-policy
attribute-based encryption
anomaly-based detection engines
Access Control
biblio
Feature extraction using Deep Learning for Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
intrusion detection system
Web system
smart intrusion detection system
security of data
Resiliency
pubcrawl
principal component analysis
machine learning research
learning models
learning (artificial intelligence)
Intrusion Detection Systems
Compositionality
Intrusion Detection
fully trainable system
feature extraction
deep learning system
deep learning
Data mining
computational intelligence
composability
Classification algorithms
Cryptography
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »