Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
deep Web visualization
visualization
unknown dark channels
Tors encryption client
security
search engines
pubcrawl
Java
internet
Human Factors
Human behavior
Google
drugs
analysis
deep web
Databases
Data visualization
data visualisation
dark web
Cryptography
Crime Trace
crime monitoring
crime management
crime information visual system
Computer crime
biblio
Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics
Submitted by grigby1 on Fri, 01/15/2021 - 12:03pm
Image forensics
YouTube
online information trustworthiness
DeepFake video dataset
DeepFake forensics
DeepFake detection algorithms
Celeb-DF
AI-synthesized face-swapping videos
DeepFake
video signal processing
Videos
Image color analysis
Training
visualization
resilience
Decoding
detection algorithms
internet
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:37pm
convolutional neural networks
packet flows
networking related tasks
network traffic image orientation mappings
Internet traffic classification
deep convolutional neural networks
application network signatures
2-dimensional formulation
Network traffic classification
deep packet inspection
network administrators
Streaming media
deep learning
computer network security
quality of service
Bandwidth
machine learning
internet
neural nets
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
telecommunication traffic
Scalability
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
OT Network
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
internet
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
deep neural networks
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
SCADA Systems Security
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
Virtual private networks
VPN/Non-VPN Traffic Characterization
traffic characterization
Per Application Classification
Multimedia Web sites
Application Identification
deep packet inspection
social networking (online)
deep learning
Scalability
convolutional neural networks
quality of service
internet
pubcrawl
Resiliency
feature extraction
Internet of Things
biblio
Evaluating Bad Hosts Using Adaptive Blacklist Filter
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
incident evaluation
unreliable alerts
telecommunication traffic
Scalability
Resiliency
resilience
publicly available blacklists
pubcrawl
network flow data
national backbone network
Metrics
internet
adaptive blacklist filter
flow-based monitoring
false positives
evidence capture
evaluator module
digital signatures
computer network security
blacklists
bad hosts
automated evaluation techniques
adaptive filters
adaptive filtering
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
differential privacy protection technology
social software
resilience
position trajectory
mobile Internet technology
mobile computing
Metrics
location trajectory privacy protection
location trajectory Big Data
location trajectory
location based services
internet
GPS technology
Global Positioning System
differential privacy
differential privacy protection
Data protection
data privacy
Big Data privacy protection
big data privacy
Big Data
Algorithm
Human behavior
Resiliency
Scalability
composability
pubcrawl
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »