Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious activities
biblio
Fuzzy Logic based Network Intrusion Detection Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
intrusion detection system
security
rule base generation steps
Resiliency
resilience
pubcrawl
normal network traffic
noisy data
NIDSs
network intrusion detection systems
network connectivity
Metrics
malicious activities
abnormal network traffic
interpolation
fuzzy rule interpolation
fuzzy logic based solutions
Fuzzy logic
feature extraction
false positive classification
electronic communication
Cyber Physical System
computer networks
computer network security
computer network
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
Audio Based Drone Detection and Identification using Deep Learning
Submitted by aekwall on Mon, 08/03/2020 - 9:17am
drone activities
deep learning techniques
drone detection
Acoustic Fingerprinting
Acoustic Fingerprints
audio recorded samples
audio recording
deep neural network algorithms
Drone
Acoustics
drone audio clips
Drone Audio Dataset
drone identification
flying drones
multiprocedural process
private properties
UAVs
Unmanned Aerial Vehicles
convolutional neural network
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
machine learning
malicious activities
drones
Noise measurement
recurrent neural nets
Recurrent neural networks
Artificial Intelligence
deep learning
audio signal processing
autonomous aerial vehicles
recurrent neural network
biblio
MANiC: Multi-step Assessment for Crypto-miners
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
profitability
Human Factors
malicious activities
Malicious URL
malware
Metrics
Multistep assessment
normal browser behaviour
online front-ends
Human behavior
pubcrawl
related CryptoJacking research
resilience
Resiliency
suspicious behaviour
Web Browser Security
Web sites
Web-based Threats
CPU-based mining
bitcoin
blacklisting
Browser Security
browser-hijacking
Browsers
Browsers host
composability
Compositionality
application program interfaces
Crypto-miners
Crypto-mining
crypto-mining scripts
cryptocurrencies
cryptojacking
CryptoJacking websites
Data mining
Drive-by Mining
biblio
Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution
Submitted by grigby1 on Mon, 03/02/2020 - 12:31pm
IDS
Tamper resistance
Signatures
security
Scalability
pubcrawl
Permissionless
Metrics
malicious activities
latency
blockchain
Human Factors
Human behavior
features
data integrity
Data injection
data consistency
cyberattacks
cooperative intrusion detection
biblio
User Behavior Profiling Using Ensemble Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:24am
resilience
Monitoring
MSLSTM
multistate long short term memory
multistate LSTM
network walls
Neural networks
Organizations
policy-based governance
pubcrawl
Metrics
Resiliency
security of data
Servers
spatial-temporal behavior features
time series
Time Series Anomaly Detection
user behavior action sequence
user behavior profiling
ensemble hybrid machine learning
behavioural sciences computing
CNN
collaboration
convolution
convolution neural network
convolution neural networks
convolutional neural nets
cyber security
Anomaly Detection
feature extraction
Human behavior
human behavior impact
insider threat
Insider Threat Detection
learning (artificial intelligence)
machine learning
malicious activities
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
potential physical impacts
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
command injection attacks
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
Global Positioning System
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
security of data
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
1
2
next ›
last »