Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
Metrics
Zero-day attacks
Zero day attacks
side-channel attacks
Resiliency
resilience
pubcrawl
Monitoring
microarchitecture
composability
machine learning
Identification
Hardware
feature extraction
Detectors
detection
defense
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
Floods
Intelligent Data and Security
Intelligent Data Security
optimized neural network
Intelligent vehicles
abnormal bus data detection
abnormal bus data analysis
abnormal bus data
data centers
connected vehicles
Intelligent Transportation Systems
attack
Compositionality
Automotive engineering
Logic gates
neural network
data analysis
Vulnerability
neural nets
standards
detection
pubcrawl
Resiliency
Scalability
intrusion detection system
security of data
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
service-level DDoS attacks
network-level data
detection
Deep-learning
DDoS attack detection
DDoS
bitcoin network-level
Bitcoin ecosystem
computer network security
financial data processing
bitcoin
cryptocurrency market
cryptocurrencies
Human behavior
pubcrawl
blockchain technology
Scalability
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Application of Improved Image Hash Algorithm in Image Tamper Detection
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
image tamper detection
Transportation
smart cities
ROC curve
ring segmentation
ring segment
ring region
Resiliency
resilience
random vector
pubcrawl
measurement vector
improved image hashing algorithm
image tampering detection
Annular Segmentation
image segmentation
image hashing technique
image
hash value
hash algorithms
hash algorithm
feature extraction
detection
Cryptography
Conferences
compressed sensing
Compositionality
Big Data
biblio
Matlab Simulation of Algorithms for Face Detection in Video Surveillance
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video image
Viola-Jones waterfall method
resource optimization
Kanade-Lucas-Tomasi algorithm
Hausdorff distance
geometric models
faces
Face detection
detection problems
MATLAB
face recognition
MatLab simulation
video surveillance system
video surveillance
feature extraction
object detection
video signal processing
object tracking
digital camera
Cameras
optimisation
Metrics
Algorithms
detection
pubcrawl
Human behavior
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »