Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network behaviour
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
Internet of Things
threat vectors
software-defined networking
software defined networking
sequential decision making problems
SDN
Scalability
RL-based threat mitigation
resilience
Reinforcement learning
pubcrawl
neural fitted Q-learning agent
network security management
network behaviour
machine learning
learning (artificial intelligence)
threat mitigation
global network view
Decision Making
computer networks
computer network security
autonomous threat mitigation
autonomous network systems
ATMoS
APT
advanced persistent threat
ad-hoc solutions
active threat mitigation
Human behavior
Metrics
Resiliency
biblio
A Trust Management Framework for Network Applications within an SDN Environment
Submitted by grigby1 on Wed, 05/09/2018 - 3:02pm
pubcrawl
Trusted Computing
Trust management
trust
software defined networking
security
SDN environment
SDN
Router Systems Security
Router Systems
Resiliency
resilience
Reliability
Aerospace electronics
Ports (Computers)
network resources
network behaviour
network applications
Metrics
control systems
computer network security
authorization
authorisation permissions
authorisation
authentication
biblio
Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
multiple infected machines
network behaviour
network communication uniformity
outgoing bot attacks
port scanning attacks
pubcrawl
real-world spamming
resilience
Monitoring
Servers
synchronised behaviour
Synchronization
trojan horse detection
Trojan horses
unsolicited e-mail
widespread infection
botnet communication
malicious behaviour
large-scale malware propagation campaigns
invasive software
in-the-wild botnet attacks
early infection
early detection
distributed attack
cyber physical systems
computer network security
Computer crime
composability
command botnets
botnet-infected machines
botnet traffic
botnet controllers