Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

misbehaving node

biblio

Visible to the public Protecting Messages Using Selective Encryption Based ESI Scheme for MANET

Submitted by aekwall on Tue, 05/26/2020 - 11:03am
  • Selective Encryption
  • wired networks
  • reasons MANET
  • protecting messages
  • misbehaving node
  • ESI scheme
  • encryption scheme
  • dynamic topology
  • centralized administrator
  • ample protection
  • MANET security
  • mobile nodes
  • message passing
  • telecommunication security
  • security scheme
  • Compositionality
  • mobile ad hoc network
  • telecommunication network topology
  • mobile ad hoc networks
  • MANET
  • Metrics
  • Routing protocols
  • pubcrawl
  • Resiliency
  • Cryptographic Protocols
biblio

Visible to the public Cloud Insider Attack Detection Using Machine Learning

Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
  • security
  • machine learning
  • machine learning approaches
  • malicious node
  • misbehaving node
  • Monitoring
  • privacy
  • pubcrawl
  • resilience
  • Resiliency
  • Long short-term memory
  • security approaches
  • security of data
  • short-term behavioral data
  • trusted users
  • User behavior
  • valuable information
  • vulnerable information
  • vulnerable user node
  • compromised node
  • anomaly node
  • attackers
  • broken node
  • Cloud Computing
  • cloud insider attack detection
  • cloud network
  • cloud security issues
  • cloud user
  • composability
  • Anomaly Detection
  • Data models
  • data sources
  • deep learning
  • improvised long short-term memory model
  • internal attacker
  • internal attackers compromise
  • learning (artificial intelligence)
  • Logic gates

Terms of Use  |  ©2023. CPS-VO