Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnet
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
slow HTTP attack
Metrics
network flow data
network management complexity
Ping flood attack
pubcrawl
resilience
Resiliency
Servers
IP networks
software defined networking
Software Defined Networks
TCP flags
TCP SYN flood attack
telecommunication control
telecommunication traffic
transport protocols
distributed denial of service attack
botnet
composability
Computer crime
computer network management
computer network security
DDoS attack detection
denial-of-service attack
distributed denial of service
DDoS attack mitigation
distributed source
Entropy
Floods
HTTP attacks
Human behavior
internet
invasive software
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
electronic messaging
Human Behavior and Cybersecurity
SMSBotHunter
SMS stealer botnets
SMS spammer botnets
SMS botnet
one-class classification
mobile botnets
detect SMS botnets
SMS messages
dynamic analysis
anomaly detection technique
Anomaly Detection
botnet
Training
internet
Cryptography
Mobile handsets
pubcrawl
Human behavior
feature extraction
mobile computing
invasive software
malware
Servers
biblio
Whispering Botnet Command and Control Instructions
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Compositionality
whispering botnet command and control instructions
whisper
stealthy communication methods
radar communication
peer-to-peer communication infrastructure
dark communication strategy
control bots
C&c
bidirectional botnet command and control operations
command and control systems
botnet
Cryptography
Metrics
botnets
invasive software
Protocols
internet
computer network security
Resiliency
pubcrawl
Peer-to-peer computing
blockchain
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Metrics
modern malware
host-based intrusion detection system
botnet detection system
botnet attack detection
Biological cells
botnet
genetic algorithm
genetic algorithms
Compositionality
tools
botnets
invasive software
network security
intrusion detection system
computer network security
Resiliency
pubcrawl
IP networks
Intrusion Detection
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
road safety
vehicular bots
vehicular botnets
vehicular botnet communication
vehicular botnet attacks
VANET Security
SHIELDNET
Reputation-Based Security
Internet botnets
inter-vehicular communications
efficiency 77.0 percent
adaptive detection mechanism
collision avoidance
botnet
Intrusion Detection
learning (artificial intelligence)
Compositionality
Metrics
vehicular ad hoc networks
botnets
invasive software
standards
Protocols
internet
computer network security
Resiliency
pubcrawl
machine learning algorithms
machine learning
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »