Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
mission critical applications
Trojan horses
trojan horse detection
traditional techniques
Temperature sensors
system-on-chip
simple processing mechanism
runtime hardware Trojan detection techniques
Runtime
Resiliency
resilience
pubcrawl
power distribution networks
Monitoring
behavior profiling
manufacturing test phase
IP based SoC
invasive software
Intrusion Detection
integrated circuits
Hardware
golden data model
digital power profile
cyber physical systems
Cryptography
composability
classical Advanced Encryption Standard circuit
circuit under test
biblio
Support Vector Machine for Network Intrusion and Cyber-Attack Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
network intrusion
Training
threat vectors
telecommunication traffic
Support vector machines
support vector machine
statistical techniques
statistical analysis
security of data
pubcrawl
privacy
Ports (Computers)
anomaly-based IDS
ML techniques
Metrics
Measurement
machine learning
Local area networks
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
cyber-security threats
cyber-attack detection
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
Artificial Neural Network Based IDS
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
nonmalicious communication
UDP flood attack
telecommunication traffic
SYN flood attack
standards
signature based NIDS
sensors
security of data
Resiliency
resilience
pubcrawl
Ports (Computers)
policy-based governance
anomaly based neural network intrusion detection system
NNIDS
nMap scanning attack
neural nets
network intrusion detection systems
Metrics
Intrusion Detection
digital signatures
Databases
Artificial Neural Networks
artificial neural network based IDS
anomaly based NIDS
biblio
Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
network intrusion detection system
water
UNSW-NB15 dataset
UNSW-NB15
unseen data
Training
testing
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Neural networks
network security
Artificial Neural Networks
multilayer feed-forward artificial neural Network
Metrics
Measurement
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
H2O
feedforward neural nets
deep learning binomial classifier
deep learning
conventional machine-learning algorithms
complex features
Big Data
biblio
Autoencoder-Based Feature Learning for Cyber Security Applications
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
invasive software
Vectors
Training
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Metrics
malware classication
malware
machine learning
learning (artificial intelligence)
AE
Intrusion Detection
feature vector
feature learning
feature extraction
encoding
cyber security
computer security
computer network security
autoencoder
Artificial Neural Networks
anomaly intrusion detection
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »