Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
defense
biblio
Zero-Day Attack Packet Highlighting System
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
PCA
Zero day attacks
zero-day attack
security
Resiliency
resilience
pubcrawl
Protocols
principal component analysis
Communications technology
NIDPS
Metrics
Inspection
dpi
defense
Data mining
composability
biblio
Federated Learning for Anomaly-Based Intrusion Detection
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
Collaborative Work
composability
Data models
data privacy
deep learning
defense
Metrics
network intrusion detection
privacy
pubcrawl
resilience
Resiliency
telecommunication traffic
Zero day attacks
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
Complex Strategy against Supply Chain Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 12:35pm
pubcrawl
zero trust
Zero day attacks
supply chains
Supply Chain
Software measurement
Software
security operation centre
Resiliency
resilience
army
Organizations
Metrics
History
defense
cyber-attack
Computer crime
composability
Communication Systems
communication and information systems protection
biblio
FastMove: Fast IP Switching Moving Target Defense to Mitigate DDOS Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 12:35pm
denial-of-service attack
Switches
Servers
Resiliency
resilience
pubcrawl
moving target defense
Metrics
IP networks
IP address
Zero day attacks
DDoS
Computer crime
computer architecture
composability
Complexity theory
Cloud Computing
Bot
attack
defense
biblio
Securing the Supply Chain
Submitted by willirn1 on Wed, 10/27/2021 - 11:35am
security
Supply Chain
Compromise
defense
C3E
risk management framework
biblio
Defense Science Board Task Force on Cyber Supply Chain
Submitted by willirn1 on Mon, 10/25/2021 - 5:51pm
defense
cyber
Supply Chain
C3E
Policy
biblio
Defense Acquisitions Annual Assessment: Drive to Deliver Capabilities Faster Increases Importance of Program Knowledge and Consistent Data for Oversight
Submitted by willirn1 on Fri, 10/22/2021 - 10:41am
C3E
Data Oversight
defense
biblio
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory
Submitted by aekwall on Thu, 06/24/2021 - 11:49am
Training data
AI Poisoning
Toxicology
show and tell model
poisoning attack
defense
autoencoder
AI
Dogs
Scalability
image recognition
image restoration
Neural networks
pubcrawl
Human behavior
Resiliency
Data models
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »