Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Integrating visual analysis of network security and management of detection system configurations
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
collaboration
Communication networks
Configuration Management
Data models
Databases
Intrusion Detection
Intrusion Detection Systems
Monitoring
network security
policy evaluation
policy-based governance
pubcrawl
Security Policies Analysis
Security Visualization
visualization
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Intrusion Detection
Training
RNN infrastructure
resource exhaustion attack detection
Resiliency
replicator neural network infrastructure
pubcrawl
policy-based governance
Policy
Neural networks
neural nets
network profiling technique
learning (artificial intelligence)
anomaly-based intrusion detection
internet
Government
Governance
flow-based anomaly intrusion detection analysis
feature extraction
Entropy
deep learning technique
computer network security
Computational modeling
collaboration
Artificial Neural Networks
artificial neural network
biblio
Network security intrusion detection system based on incremental improved convolutional neural network model
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
intrusion behavior testing
system detection
security of data
Resiliency
pubcrawl
pretreatment
policy-based governance
Policy
Neurons
neural network
neural nets
network security
intrusion detection system
Intrusion Detection
artificial neural network
intrusion behavior detection
Government
Governance
feature extraction
detecting system
data analysis
data acquisition
convolutional neural network
convolution
Computers
Communication networks
collaboration
Artificial Neural Networks
biblio
Active surveillance using depth sensing technology \#8212; Part I: Intrusion detection
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
outdoor intrusion activities
wall climbing detection
video surveillance
Streaming media
skeletal trespassing detection
skeletal position monitoring
sensors
safety systems
Resiliency
real-time systems
pubcrawl
premise intrusion
active surveillance
object detection
Microsoft Kinect sensor
Metrics
loitering detection
Intrusion Detection
image sensors
Human Factors
Human behavior
depth sensing technology
computer architecture
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays
biblio
Mind The Plug! Laptop-User Recognition Through Power Consumption
Submitted by K_Hooper on Wed, 10/18/2017 - 10:14am
Smart Grid Privacy
energy consumption.
Internet of Things
Intrusion Detection
machine learning
Metrics
pubcrawl
Resiliency
smart building
Smart Grid Sensors
smart meter
user identification
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Fri, 09/15/2017 - 10:59am
honey pots
honeynet
honeypot
Human behavior
Intrusion Detection
intrusion prevention
network security.
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
44
45
46
47
48
49
50
51
52
…
next ›
last »