Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion detection techniques
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
network intrusion detection
wireless networks
wireless network
wireless Adhoc networks
wired environment
telecommunication security
security of data
security
Routing protocols
Resiliency
resilience
pubcrawl
pre-existing unfolding solutions
Network-based anomaly intrusion detection system
Network Simulator-2
network protocols
MANET Attack Detection
mobile radio
mobile adhoc networks
mobile ad hoc networks
Metrics
MANETs
intrusion detection techniques
intrusion detection system
infrastructure-less networks
IDS
fixed wired network
Compositionality
component
Ad hoc networks
ad hoc network
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 12:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis