Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Integrated Anomaly Detection for Cyber Security of the Substations
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
simultaneous intrusion detection method
physical security
power engineering computing
Power Grid
power grids
power system reliability
sampled measured value
severe cascading events
simultaneous anomaly detection
network-based anomaly detection systems
SMV
SMV anomaly detection and intrusion detection
substation automation
substation automation testbed
substation facilities
Substations
temporal anomalies
user-interfaces
GOOSE
Anomaly Detection
catastrophic power outages
circuit breakers
computer network security
computer security
cyber intrusions
cyber security of substations
generic object oriented substation event
ADS
GOOSE anomaly detection
host-based anomaly detection systems
IED
integrated anomaly detection system
intelligent electronic devices
Intrusion Detection
malicious behaviors
multicast messages
biblio
Network Intrusion Detection System using attack behavior classification
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
Neural networks
unauthorized accesses
TDNN neural network structure
TDNN neural network
reconnaissance attacks
Protocols
Probes
preprocessor
Ports (Computers)
port scan attacks
Port scan
Pattern recognition
pattern classification
packet capture engine
NIDS
alert module
neural nets
network probe attacks
Network probe attack
network intrusion detection system
IP networks
Intrusion Detection Systems
Intrusion Detection
host-based intrusion detection system
host sweep attacks
Host sweep
HIDS
computer security systems
computer network security
attack behavior classification
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
factorial space
UDP-flood DDoS attacks
transport protocols
system-based detection
system metrics
source-based detection
principal component analysis
Monitoring
Measurement
malicious use
legitimate usage
legitimate activity
Intrusion Detection
botcloud activity
distributed system behavior analysis
distributed processing
distributed massive attacks
computer network security
Computer crime
collaboration
cloud service provider
Cloud Computing
botnets
botcoud behavior
botcloud detection
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Thu, 04/30/2015 - 12:49pm
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Thu, 04/30/2015 - 12:05pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
file
Preemptive Intrusion Detection: Theoretical Framework and Real-world Measurements
Submitted by Ravi Iyer on Wed, 04/29/2015 - 11:17am. Contributors:
Phuong Cao
Eric Badger
Zbigniew Kalbarczyk
Ravishankar Iyer
Adam Slagell
Science of Security
Foundations
Intrusion Detection
HotSoS 2015
Academia
Presentation
Presentations
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Tue, 04/28/2015 - 1:06pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
« first
‹ previous
…
49
50
51
52
53
54
55
56
57
next ›
last »