Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic data
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
LuNet: A Deep Neural Network for Network Intrusion Detection
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
recurrent neural nets
Metrics
network attack
network intrusion detection
network intrusion detection techniques
network traffic data
network traffic datasets
network users
Neural Network Security
policy-based governance
pubcrawl
machine learning
recurrent neural network
Recurrent neural networks
Resiliency
security issue
signature-based approach
spatial features
telecommunication traffic
temporal features
Training
feature extraction
AI-based solutions
Artificial Neural Networks
collaboration
computer network security
convolutional neural nets
convolutional neural network
cyber physical systems
Deep Neural Network
detection capability
advanced network attacks
hierarchical CNN+RNN neural network
input traffic data learning
intelligent capability
Intrusion Detection
intrusion detection system
Kernel
large scale network
learning (artificial intelligence)
LuNet
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
EDMAND: Edge-Based Multi-Level Anomaly Detection for SCADA Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
network traffic data
telecommunication traffic
supervisory control and data acquisition systems
security of data
security
Scalability
SCADA systems
SCADA network traffic
Resiliency
resilience
pubcrawl
Protocols
network-based intrusion detection
Anomaly Detection
Monitoring
Metrics
malicious attacks
large-scale distributed industrial systems
Image edge detection
event detection
EDMAND
edge-based multilevel anomaly detection
edge detection
Detectors
composability
appropriate anomaly detection methods
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 10:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks