Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint
Submitted by K_Hooper on Wed, 01/10/2018 - 11:10am
Acoustic Fingerprints
composability
Fingerprinting
Flow-net
Human behavior
Intrusion Detection
pubcrawl
Resiliency
biblio
A Trust Management Based Framework for Fault-Tolerant Barrier Coverage in Sensor Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Resiliency
wireless sensor networks
wireless senor network
trust management-based framework
TrusDet
temporal sensory output correlation
telecommunication security
telecommunication network reliability
spatial sensory output correlation
sink-level decision
sensors
sensor-level detection
Robustness
collective voting
pubcrawl
intrusion tolerance
Intrusion Detection
HC-SR501 infrared sensor
Fuses
faulty sensor recognition
fault-tolerant intrusion detection algorithm
fault-tolerant barrier coverage
Fault tolerant systems
fault tolerance
Correlation
composability
biblio
Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion prevention
Training
threat model
Threat Index
security threats
security of data
security issues
security
Resiliency
pubcrawl
Protocols
privacy
IoT-based CPS
IoT based CPHS
intrusion tolerance
Byzantine replication
Intrusion Detection
Internet of Things
Indexes
human participation
human involvement
human elements
holistic framework
cyber-physical systems
cyber-physical human systems
CPHS environment
composability
collaborative attacks
collaboration
biblio
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
fuzzy classifiers
VM failures
virtual machines
Training
security of data
Resiliency
pubcrawl
pattern classification
Learning systems
learning (artificial intelligence)
KDD99
intrusion tolerance
Intrusion Detection Systems
Intrusion Detection
IDS
groupware
Anomaly Detection
fuzzy classifier
Fault-Tolerance
fault tolerant computing
Ensemble Learning
Decision trees
Decision Tree
dataset segmentation
composability
Collaborative Systems
collaborative ensemble-learning
collaboration
cloud-based distributed system
Cloud Computing
Bagging
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
An intelligent security system for autonomous cars based on infrared sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
nonsafety applications
ICMetric technology
ICmetrics
infrared detectors
infrared sensors
Integrated Circuit Metric technology
intelligent security system
Intelligent Transportation Systems
Intrusion Detection
mobile robots
Hacking
notification messages
road safety
road vehicles
self-driving vehicles
simulated vehicular ad hoc network
traffic engineering computing
unique extracted features
sensor security
security system
pubcrawl
Resiliency
Human behavior
Human Factors
feature extraction
composability
security of data
vehicular ad hoc networks
Metrics
telecommunication security
automobiles
autonomous cars
autonomous vehicle system
autonomous vehicles
awareness messages
control data authentication
external communication systems
biblio
Deployment and analysis of honeypots sensors as a paradigm to improve security on systems
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
security of data
sensor security
Sensor Systems
security breaches
safety gaps
Ports (Computers)
honeypots
honeypot sensors deployment
attacker
Servers
Metrics
Protocols
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Intrusion Detection
security
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »