Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

defensive systems

biblio

Visible to the public Polymorphic Adversarial DDoS attack on IDS using GAN

Submitted by aekwall on Mon, 03/29/2021 - 11:57am
  • adversarial data
  • Intrusion Detection
  • Generators
  • generative adversarial networks
  • Predictive Metrics
  • Malicious Traffic
  • Intrusion Detection Systems
  • gan
  • adversarial attacks
  • natural language processing
  • adversarial DDoS attacks
  • Attack Profile
  • defensive systems
  • generative adversarial networks (GAN)
  • polymorphic Adversarial DDoS attack
  • unknown types
  • Generative Adversarial Learning
  • security of data
  • Training
  • incremental learning
  • machine learning
  • pubcrawl
  • Resiliency
  • learning (artificial intelligence)
  • feature extraction
  • DDoS Attacks
  • machine learning algorithms
  • Data models
  • malware
  • telecommunication security
  • Scalability
  • IDS
  • computer network security
biblio

Visible to the public Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach

Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
  • network steganography
  • Traffic Coloring
  • steganography detection approach
  • steganography detection
  • Steganography
  • RTP
  • RTCP
  • real-time systems
  • real-time services
  • pubcrawl
  • Protocols
  • privacy
  • overt protocols
  • network traffic coloring
  • network threats
  • Bandwidth
  • Metrics
  • malicious control server
  • inter-protocol steganography
  • inter-protocol hiding techniques
  • Information hiding
  • Google
  • Electronic mail
  • delays
  • defensive systems
  • Data visualization
  • data encapsulation
  • Cryptographic Protocols
  • computer network security
  • composability

Terms of Use  |  ©2023. CPS-VO