Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
real-time detection
ZeroWall
zero-day Web attacks
Zero-day attacks
zero-day attack request
Zero day attacks
widely-deployed signature-based Web Application Firewalls
web security
Syntactics
Semantics
security of data
Resiliency
resilience
Recurrent neural networks
Anomaly Detection
pubcrawl
Metrics
internet
historical Web requests
Hidden Markov models
Firewalls (computing)
existing WAF
existing signature-based WAF
encoder-decoder recurrent neural network
digital signatures
defense
computer network security
composability
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
biblio
XAI-Driven Explainable Multi-view Game Cheating Detection
Submitted by aekwall on Mon, 03/01/2021 - 5:02pm
multiple game productions
cheating detection
debugging
EMGCD
evidence generation
game health
game industries
illegal automated plugins
model compression
model debugging
cheating classifiers
NetEase Games
online game
Online Games
online gaming
online persistent virtual world
player enjoyment
reason generation
trustworthy performance
XAI-driven explainable multiview game cheating detection
explainable AI
Task Analysis
Data models
Resiliency
pubcrawl
internet
Games
Predictive models
visualization
Artificial Intelligence
Scalability
virtual reality
artificial intelligence techniques
computer games
xai
industrial application
AI models
detection framework
explainable artificial intelligence
audience profiles
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:42pm
Linguistics
Wireless Mesh Network Security
self-organized technology
self-configured technology
safe traffic adaptation model
safe traffic adaptation
queue length
performance efficiency
network traffic load
fuzzy framework
future queue state
explicit rate messages
queueing theory
Monitoring
wireless mesh networks
delays
control systems
fuzzy set theory
Fuzzy logic
internet
Metrics
composability
pubcrawl
Resiliency
real-time systems
telecommunication traffic
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 2:38pm
packet header bits
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
Clocks
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
Communication networks
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
security
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 2:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »