Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Towards a Conversational Agent for Threat Detection in the Internet of Things
Submitted by aekwall on Mon, 12/16/2019 - 2:28pm
Internet of Things
Virtual Assistant
user speech
threat detection
telecommunication traffic
situational awareness
Scalability
pubcrawl
network traffic
network information
Metrics
invasive software
Intrusion Detection
conversational agents
Human behavior
DynamoDB Table
DDoS
conversational agent
conversation agents
consumer IoT networks
computer network security
Cloud Computing
botnet
anomalous traffic
Amazon Echo
Alexa
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
SDN
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
PI controllers
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
GENI testbed
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
Attack Analyzer
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
file
System Infrastructure for SMM-based Runtime Integrity Measurement
Submitted by Karen Karavanic on Mon, 11/25/2019 - 1:04pm. Contributor:
Karen Karavanic
Posters
Intrusion Detection
Systems
1528185
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Towards Scalable Private Collaborative Learning
Submitted by Nikos Triandopoulos on Mon, 11/25/2019 - 1:04pm. Contributors:
Nikos Triandopoulos
Alina Oprea
Samaneh Berenjian
Xianrui Meng
Dimitrios Papadopoulo
Posters
Applied cryptography
data science
Information Authenticity
Intrusion Detection
Applied Privacy
1718782
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
mobile computing
Wireless communication
Ubuntu OS
telecommunication network topology
self-organizing
self-maintenance
security of data
security
secure mechanism
Router Systems Security
Resiliency
resilience
pubcrawl
NS 2.35 software
Ad hoc network attacks
mobile ad hoc networks
Metrics
MAES
Linux
intrusion detection system
Intrusion Detection
hybrid system
Elliptic curve cryptography
ECC
dynamic topology features
Conferences
Ad hoc networks
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
file
Holmes Real-Time APT Detection through Correlation of Suspicious Information Flows
Submitted by Ramasubramanian S... on Mon, 10/21/2019 - 12:28pm. Contributors:
R. Sekar
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
V.N. Venkatakrishnan
Posters
Intrusion Detection
Software
Systems
1918542
1918667
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
INSaNE: Improving Network Security at the Network Edge
Submitted by Edmundo de Souza ... on Mon, 10/21/2019 - 12:28pm. Contributors:
Edmundo de Souza e Silva
Antônio Abelém
Don Towsley
Posters
data science
Intrusion Detection
Wired Networking
1740895
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »