Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance evaluation
biblio
A Stochastic Assessment of Attacks based on Continuous-Time Markov Chains
Submitted by grigby1 on Wed, 03/17/2021 - 11:40am
probability
trees (mathematics)
Transient analysis
Time measurement
stochastic propagation times
Stochastic processes
stochastic methodology
stochastic assessment
Statistical performance evaluation
sequential attack
security of data
Scalability
Resiliency
resilience
pubcrawl
attack propagation
Petri nets
performance evaluation
Markov processes
individual attack occurrence probabilities
cyber-physical systems
Cyber-physical attack
critical infrastructures
critical infrastructure
continuous-time Markov chains
Conferences
concurrent attack
Chained Attacks
basic attack tree
attack trees
biblio
The Modbus Protocol Vulnerability Test in Industrial Control Systems
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
command injection attacks
composability
critical infrastructure
industrial control
Industrial Control System (ICS)
integrated circuits
Metrics
Modbus protocol
performance evaluation
Protocols
pubcrawl
resilience
Resiliency
security
Security test
virtual environments
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 1:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
Metrics
Surges
Robustness
Resiliency
resilience
pubcrawl
performance evaluation
optimization
Microelectronics
Bayesian optimization
machine learning
IoT
Decision trees
composability
botnets
Botnet detection
botnet
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
performance evaluation
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
IoT devices
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
Anomaly Detection
IoT Botnets
invasive software
Internet of Things
deep-learning classifiers
deep learning
Cybersecurity
confidentiality integrity and availability attacks
computer network security
composability
Classification algorithms
CIA attacks
botnets
Botnet detection
botnet activity
botnet
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 11:05am
electronics anomaly detection
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
fault diagnosis
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
Metrics
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Conferences
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
security idea
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
network microsegmentation
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
data center network
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
zero trust
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
biblio
Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking
Submitted by grigby1 on Mon, 02/08/2021 - 1:04pm
policy makers
video surveillance
urban surveillance
urban planners
tracking tasks
Task Analysis
surveillance
smart surveillance
situational awareness
security
Scalability
Resiliency
resilience
real-time human detection
Real time Human Detection and Tracking
pubcrawl
composability
performance evaluation
object tracking
object detection
Metrics
Image edge detection
fog
feature extraction
edge-fog layers
edge service
edge detection
dynamic data-driven tasks
Decision Making
critical data-driven tasks
computer architecture
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »