Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
performance evaluation
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
IoT devices
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
Anomaly Detection
IoT Botnets
invasive software
Internet of Things
deep-learning classifiers
deep learning
Cybersecurity
confidentiality integrity and availability attacks
computer network security
composability
Classification algorithms
CIA attacks
botnets
Botnet detection
botnet activity
botnet
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
White-Hat Worm Launcher Based on Deep Learning in Botnet Defense System
Submitted by grigby1 on Tue, 03/09/2021 - 2:21pm
IoT system
worms placement
white-hat worm launcher
white-hat botnets
Training data
Resiliency
resilience
pubcrawl
Metrics
Mathematical model
malware
malicious botnets
learning (artificial intelligence)
BDS
IoT
invasive software
Internet of Things
Grippers
deep learning
Data models
computer network security
computer network performance evaluation
composability
botnets
botnet defense system
botnet
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Scalability
zero trust
usage control
Smart homes
trust
ABAC
Prototypes
authorization
privacy
computer architecture
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
IoT
Monitoring
Internet of Things
biblio
Federated TONİoT Windows Datasets for Evaluating AI-Based Security Applications
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
privacy
Windows operating systems
Windows Operating System Security
Windows operating system
virtualization privacy
Virtual machining
virtual machine security
virtual machine
testbed
security
Resiliency
resilience
pubcrawl
Linux Operating System Security
operating systems
Metrics
Intrusion Detection
Internet of Things
Human behavior
Federated datasets
data privacy
Computer crime
composability
Cloud Computing
AI-based security applications
biblio
Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
Scalability
zigbee 802.15.4
Zigbee
wireless sensor networks
sensor security
Wireless Sensor Network
Wireless Mesh Network Security
Wireless communication
Throughput
security
Black hole attack
Routing
Resiliency
quality of service
pubcrawl
network security
Metrics
Internet of Things
composability
Blackhole attack
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »