Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Intrusion detection systems vulnerability on adversarial examples
Submitted by grigby1 on Mon, 01/21/2019 - 12:14pm
Intrusion Detection Systems
vulnerability detection
Training
security of data
security events
Resiliency
pubcrawl
Neurons
Metrics
intrusion detection systems vulnerability
adversarial examples
Intrusion Detection
Human behavior
Compositionality
Classification algorithms
Biological neural networks
attack vector
anomaly-based intrusion detection
anomaly detection systems ability
Anomaly Detection
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
Compressed Sensing based Intrusion Detection System for Hybrid Wireless Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
Logic gates
wireless networks
wireless mesh networks
sparse signal reconstruction
sparse original signals
signal reconstruction
resilience
pubcrawl
power consumption
PHY layer
Peer-to-peer computing
Overhead
Metrics
Measurement
active state metric
intrusion detection system
Intrusion Detection
hybrid WMN
hybrid wireless mesh networks
high detection overhead
energy consumption
detecting intrusions
computer network security
compressive sampling
compressive sampled data
compressed sensing theory
compressed sensing
composability
biblio
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
botnets
honey pots
Human Factors
Intrusion Detection
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
biblio
A graph-based representation of relations in network security alert sharing platforms
Submitted by grigby1 on Fri, 09/28/2018 - 4:14pm
Monitoring
visual guide
situational awareness tool
sensors
security
Scalability
Resiliency
resilience
pubcrawl
network security alert sharing platforms
collaboration
Metrics
Intrusion Detection
Image edge detection
graph-based representation
graph database
edge detection
Databases
computer network security
composability
biblio
Multi-Perspective Machine Learning a Classifier Ensemble Method for Intrusion Detection
Submitted by grigby1 on Fri, 09/28/2018 - 4:04pm
Cybersecurity
resilience
Intrusion Detection
pubcrawl
Resiliency
Human behavior
machine learning
policy-based governance
ensemble methods
E-Government
biblio
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
decryptable searchable encryption
deep packet inspection
Intrusion Detection
network middleboxes
privacy
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Intelligent security lock
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
intrusion detection system
software system
smart electronic/digital door locking system
Smart Door Lock
security features
Resiliency
resilience
real time camera surveillance
pubcrawl
mobile computing
Mobile app
message authentication
lock device
Live Camera Feeds
keys (locking)
Bluetooth
intrusion detection notification
Intrusion Detection
Intelligent Security Lock prototype
human factor
Human behavior
face recognition
doors
Conferences
comprehensive security requirements
composability
Cameras
bluetooth security
Bluetooth Lock
authentication
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »