Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anomalies detection
biblio
Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the Work of Industrial Control Systems.
Submitted by grigby1 on Tue, 03/30/2021 - 10:53am
industrial facilities
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
process control systems
process control
Neurons
machine learning
learning (artificial intelligence)
integrated circuits
information security
Industries
anomalies detection
industrial control systems (ICS)
industrial control system
industrial control
ICS Anomaly Detection
deep learning
Decoding
convolutional neural networks
convolutional neural nets
control engineering computing
complex problems
classification problems
autoencoders
auto-encoders
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
New security architecture using hybrid IDS for virtual private clouds
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
learning (artificial intelligence)
virtual private clouds
virtual private cloud
virtual machines
virtual machine security
virtual machine
telecommunication traffic
security architecture
private cloud environments
privacy vulnerability
neural nets
network-based intrusion detection system
network-based IDS
network security
Malicious Traffic
machine learning
IDS
intrusion detection system
IDS based ANN
hybrid Intrusion Detection System
hybrid IDS
host-based intrusion detection system
digital transformation
digital revolution
detection engine
data privacy
cyber-attacks
computer network security
Cloud Computing
artificial neural network
anomalies detection
pubcrawl
biblio
Functionality and Security Co-Design Environment for Embedded Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:23am
recovery
Hardware
hardware development
intelligence surveillance and reconnaissance sensors
Lincoln asymmetric multicore processing architecture
Mission Assurance
mission functions
Multicore processing
multiprocessing systems
pubcrawl
functionality
resilience
resilient embedded system
Secure Processing
security
software development
Sophisticated Attacks
surveillance
System recovery
testbed
computer network security
Resiliency
adversarial cyber effects
anomalies detection
asymmetric multicore processing
Availability
co-design
co-design environment
command and control systems
Complexity theory
Resilient Security Architectures
critical missions
Cryptography
deliberate attacks
department of defense mission systems
DoD
electronic signal intelligence systems
electronic warfare
embedded systems