Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
prevention systems
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
Modbus-TCP vulnerability
Industrial Control Systems
industrial firewall
Information Assurance
Intrusion Detection
Intrusion Detection and Prevention System
IP networks
malicious parameter command injection
Modbus TCP/IP protocol
industrial control and automation system security
Modbus/TCP
prevention systems
pubcrawl
real-time communication
refinery control
Scalability
transport protocols
DPI industrial firewall
Resiliency
composability
Predictive Metrics
attack mitigation
command injection attacks
deep packet inspection
denial of service attack
DPI capabilities
Networked Control Systems Security
firewalls
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control
biblio
Intrusion Detection System Model Implementation against DDOS attacks
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
prevention systems
DDoS attack detection
SNORT bandwidth traffic analysis
Snort
intrusion detection system model implementation
intrusion detection methods
intrusion actions
firewall policy
DDoS Attacks
computer installation
DDoS
Metrics
composability
pubcrawl
Human behavior
Resiliency
telecommunication traffic
firewalls
IDS
biblio
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
Internet of Things devices
UK National Health Service
storage access patterns
static ransomware analysis
prevention systems
machine learning based ransomware detection
live-forensic hypervisor
live ransomware samples
large-scale cyber attacks
dynamic ransomware analysis
dynamic analysis
benign application
behavioral model
Zero-day attacks
invasive software
ransomware attacks
mobile devices
cloud services
machine learning
Metrics
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
support vector machine
Support vector machines