Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
protocol parsing
transport protocols
telecommunication traffic
telecommunication control
stereo depth IDS
semantic analysis
security of data
SD-IDS
Scalability
rule extraction
Resiliency
resilience
pubcrawl
Protocols
deep inspection
period
modbus TCP protocol
Lenses
Intrusion Detection
integrated circuits
Inspection
industrial traffic
industrial network protocol
Industrial Control Systems
industrial control system
industrial control
ICS Anomaly Detection
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
From System Specification to Anomaly Detection (and Back)
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
specification
Scalability
Resiliency
resilience
pubcrawl
Intrusion Detection
Industrial Control Systems
ICS Anomaly Detection
Anomaly Detection
biblio
Detecting Monitor Compromise using Evidential Reasoning
Submitted by awhitesell on Fri, 07/13/2018 - 2:46pm
Science of Security
evidential reasoning
Intrusion Detection
machine learning
Science of Security
security
UIUC
NSA SoS Lablets Materials
Resilient Architectures
UIUC
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
file
Detecting Monitor Compromise Using Evidential Reasoning
Submitted by awhitesell on Fri, 07/13/2018 - 2:46pm
Science of Security
evidential reasoning
Intrusion Detection
machine learning
Science of Security
security
UIUC
NSA SoS Lablets Materials
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
Comparison of Ensemble Learning Methods Applied to Network Intrusion Detection
Submitted by grigby1 on Mon, 06/11/2018 - 3:26pm
False Data Detection
Bagging
boosting
composability
ensemble classifiers
Intrusion Detection
Metrics
network intrusion detection system
pubcrawl
resilience
Resiliency
Stacking
biblio
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
pubcrawl
Zero day attacks
two deep learning
Training
stochastically improved autoencoder
Stochastic processes
Stochastic Computing Security
Stochastic computing
stochastic approach
singular anomaly detection methods
security of data
security
Scalability
Resiliency
resilience
Anomaly Detection
noise reduction
network security
network anomaly detection
learning (artificial intelligence)
KDDTest+ dataset
Intrusion Detection Systems
Intrusion Detection
denoising autoencoder
deep learning
Data models
Computational modeling
autoencoder
anomaly detection models
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »