Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 10:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by BrandonB on Wed, 05/06/2015 - 10:30am
factorial space
UDP-flood DDoS attacks
transport protocols
system-based detection
system metrics
source-based detection
principal component analysis
Monitoring
Measurement
malicious use
legitimate usage
legitimate activity
Intrusion Detection
botcloud activity
distributed system behavior analysis
distributed processing
distributed massive attacks
computer network security
Computer crime
collaboration
cloud service provider
Cloud Computing
botnets
botcoud behavior
botcloud detection
biblio
Design, deployment and use of HTTP-based botnet (HBB) testbed
Submitted by BrandonB on Wed, 05/06/2015 - 10:23am
HTTP flooding
Web servers
Web access log
real time HTTP-based botnet
malware
invasive software
Intrusion Detection
Internet-connected computer programs
HTTP-GET flooding method
HTTP-based botnet
behavioural-based approaches
http bot traces
HBB testbed
Floods
distributed denial of service attacks
DDoS Attacks
Cyber Attacks
Computer crime
botnet detection systems
botnet
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 12:30pm
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Cyber Maneuvers and Maneuver Keys
Submitted by BrandonB on Tue, 05/05/2015 - 11:20am
computer security
Cryptography
cyber maneuvers
cyber security system
encryption
encryption algorithm
Hardware
Intrusion Detection
Jamming
maneuver keys
moving-target defenses
proactive network change
proactive strategy
reactive network change
secure rekeying
spread-spectrum key
« first
‹ previous
…
49
50
51
52
53
54
55
56
57
next ›
last »