Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
intrusion detection dataset toolkit
user defined synthetic attacks
telecommunication traffic
security of data
pubcrawl170109
Ports (Computers)
network traffic
network attacks
labeled dataset creation
IP networks
Intrusion Detection Systems
Computer crime
Intrusion Detection
IDS
ID2T
Entropy
DIY dataset creation toolkit
defense tool
Data visualization
data visualisation
Data mining
cyber-attacks
biblio
"Towards a science of anomaly detection system evasion"
Submitted by abfox on Tue, 02/14/2017 - 2:27pm
advanced persistent threat
anomaly detection system evasion
computer network security
Detectors
Entropy
estimation
evade detection
Grippers
Intrusion Detection
intrusion detection system
key based randomization scheme
launch evasion attack
parameter estimation
parameter estimation attacks
pubcrawl170101
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 2:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration
biblio
"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs"
Submitted by abfox on Tue, 02/14/2017 - 1:52pm
Data models
self-learning IDS
security of data
Safety
pubcrawl170101
Organizations
Intrusion Detection Systems
Intrusion Detection
ICT networks
economy vital backbone
advanced persistent threat
Cyber Attacks
customer network data
customer infrastructures
Complexity theory
BAESE system
APT
Analytical models
advanced persistent threats
biblio
"Ontology Based APT Attack Behavior Analysis in Cloud Computing"
Submitted by abfox on Tue, 02/14/2017 - 12:48pm
malicious attack behavior
zero-day vulnerability
security of data
pubcrawl170101
personal information
Organizations
ontology based APT attack behavior analysis
Ontology
ontologies (artificial intelligence)
Ontologies
malware
malicious code
advanced persistent threat
Intrusion Detection
Inference Rules
hacking techniques
economic damage
confidential information leakage
Computers
Communication system security
Cloud Computing
APT attack detection techniques
APT attack
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 12:36pm
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
"An efficient classification model for detecting advanced persistent threat"
Submitted by abfox on Tue, 02/14/2017 - 11:44am
Intrusion Detection
Vegetation
Training
targeted attack
pubcrawl170101
pattern classification
Organizations
model
Mathematical model
malware
intrusion prevention systems
advanced persistent threat
international trade
government agencies
firewalls
feature extraction
Cyber Attacks
classification model
APTs
antivirus solutions
advanced persistent threat detection
« first
‹ previous
…
47
48
49
50
51
52
53
54
55
…
next ›
last »