Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Defining the framework for wireless-AMI security in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
public key cryptography
Zigbee
WMN(Wireless Mesh Network)
wireless mesh Zigbee network topology
wireless mesh networks
Wireless communication
wireless AMI security
smart power grids
smart meters
Smart Grids
smart grid advanced metering infrastructure
security
public key infrastructure
AMI (Advanced Metering Infrastructure)
Power system protection
power engineering computing
PKI based digital certificate authentication
PKI
metering
intrusion detection system
Intrusion Detection
internal security attack
external security attack
computer network security
authentication
biblio
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
active-probing-based network intrusion detection system
Ad hoc networks
Communication system security
frequency hop communication
Intrusion Detection
Routing protocols
security of data
testing
Wireless communication
wireless mesh network
wireless mesh networks
wireless multihop networks
wireless sensor networks
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
biblio
Intelligent wall mounted wireless fencing system using wireless sensor actuator network
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
wireless camera
multihop routing
multilevel detection mechanism
radio transceivers
safety systems
Software
telecommunication computing
telecommunication network routing
wall mounted wireless intrusion detection system
Monitoring
Wireless communication
wireless mesh network
wireless mesh networks
wireless sensor actuator network
Wireless Sensor Network
wireless sensor networks
Zigbee
intelligent wall mounted wireless fencing system
Cameras
cellular radio
central control station
Communication system security
electronic messaging
GSM modem
IEEE 802.15.4
IEEE 802.15.4 protocol
active RFID
Intrusion Detection
intrusion software
IR based intrusion detection system
IR based perimeter protection
IR transceiver module
microwave based intrusion detection
microwave sensor technology
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 8:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:37am
power system networks
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA)
smart power grids
Smart Grids
Smart Grid
security of data
SCADA systems
SCADA cybersystems
Protocols
power system security
behavior-based concept
multilayer cyber-security framework
multiattribute SCADA-specific intrusion detection system
Intrusion Detection
IDS
heterogeneous white list
Detectors
Cybersecurity
cyber-attack threats
Current measurement
computer security
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
« first
‹ previous
…
49
50
51
52
53
54
55
56
57
next ›
last »