Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Exploring Ensemble Classifiers for Detecting Attacks in the Smart Grids
Submitted by aekwall on Mon, 03/18/2019 - 9:53am
Intrusion Detection
Scalability
machine learning
Resiliency
pubcrawl
Metrics
smart grid security
biblio
Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats
Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
Metrics
Training
threat vectors
threat detection classification
Support vector machines
security of data
Resiliency
pubcrawl
privacy
pattern classification
network threat classification
network intrusion detection
network behavioural features
Behavior features
LeNet-5
learning (artificial intelligence)
Intrusion Detection
feedforward neural nets
feature extraction
deep learning
cyber threats
convolutional neural networks
convolution
Conferences
composability
biblio
Using Deep Learning Model for Network Scanning Detection
Submitted by grigby1 on Wed, 03/06/2019 - 4:30pm
belief networks
collaboration
composability
Deep Belief Network
Human behavior
Intrusion Detection
Metrics
network scanning attacks
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
biblio
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:25pm
learning (artificial intelligence)
synthetic minority oversampling technique
SMOTE
Resiliency
resilience
pure detection model
pubcrawl
protection systems
pattern classification
noisy data
networked systems
malicious HTML file prediction
malicious HTML file classification
machine learning
Autonomic Security
Intrusion Detection
Hypertext systems
hypermedia markup languages
feature selection technique
feature extraction
Decision trees
data quality
cybersecurity challenges
computer security
computer network security
composability
class imbalance
Browsers
biblio
Threat Intelligence Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
computing methodology
Intrusion Detection
threat hunting
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Hunting Observable Objects for Indication of Compromise
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
indicator of compromise
Intrusion Detection
threat intelligence
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Symbolic Aggregate Approximation
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
higher detection rates
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
computer network security
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
authentication
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »