Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Collaboration Pattern and Topic Analysis on Intelligence and Security Informatics Research
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
network security
topic analysis
Terrorism
social networking (online)
Social network services
social network analysis approach
social network analysis
small-world effect
security of data
scale-free property
collaboration
ISI
Intelligent systems
intelligence and security informatics research
Intelligence and Security Informatics
Informatics
groupware
computer security
collaboration pattern
biblio
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:37am
power system networks
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA)
smart power grids
Smart Grids
Smart Grid
security of data
SCADA systems
SCADA cybersystems
Protocols
power system security
behavior-based concept
multilayer cyber-security framework
multiattribute SCADA-specific intrusion detection system
Intrusion Detection
IDS
heterogeneous white list
Detectors
Cybersecurity
cyber-attack threats
Current measurement
computer security
biblio
Integrated Anomaly Detection for Cyber Security of the Substations
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
simultaneous intrusion detection method
physical security
power engineering computing
Power Grid
power grids
power system reliability
sampled measured value
severe cascading events
simultaneous anomaly detection
network-based anomaly detection systems
SMV
SMV anomaly detection and intrusion detection
substation automation
substation automation testbed
substation facilities
Substations
temporal anomalies
user-interfaces
GOOSE
Anomaly Detection
catastrophic power outages
circuit breakers
computer network security
computer security
cyber intrusions
cyber security of substations
generic object oriented substation event
ADS
GOOSE anomaly detection
host-based anomaly detection systems
IED
integrated anomaly detection system
intelligent electronic devices
Intrusion Detection
malicious behaviors
multicast messages
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Thu, 04/30/2015 - 12:59pm
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting
Submitted by BrandonB on Thu, 04/30/2015 - 12:41pm
Linux
Virtual machining
virtual machine introspection
physical memory dump
OS-SOMMELIER
operating system precise fingerprinting
Operating system fingerprinting
multiaspect memory exclusive approach
Memory Forensics
memory exclusive guest OS fingerprinting
Linux kernels
Cloud Computing
kernel data signature
kernel code aspect
Forensics
Fingerprint recognition
digital signatures
Digital Forensics
data structures
computer security
code signature approach
code hash based approach
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Tue, 04/28/2015 - 1:06pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
Bootstrapping Trust in Commodity Computers
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Humans
Web server
Trusted Platform Module
Trusted Computing
trust
tpm
Secure Boot
privacy
information security
Banking
Hardware
Data Security
computer security
Code Identity
Central Processing Unit
Cellular phones
Bootstrap
biblio
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Anomaly Detection
computer science
computer security
Computerized monitoring
Guidelines
Intrusion Detection
Laboratories
machine learning
National security
network security
privacy
telecommunication traffic
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »