Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer networks
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
remote device
secure operation
safe operation
PASTA
network disruptions
Mesh networks
low-end verifier devices
low-end prover devices
low-end embedded devices
existing attestation protocols
connected embedded devices
collective attestation
autonomous system
autonomous networks
autonomous embedded systems
arbitrary device outages
Internet of Things
security guarantees
Scalability
Embedded System
computer networks
Robustness
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Protocols
performance evaluation
security
Remote Attestation
attestation
biblio
Intrusion Detection Using Deep Learning and Statistical Data Analysis
Submitted by aekwall on Mon, 08/10/2020 - 10:37am
Mathematical model
statistical data analysis
KDD cup 99 datasets
binary classification model
deep learning algorithm
artificial neural network
deep learning
data classification
cyber physical systems
Artificial Neural Networks
computer networks
statistical analysis
Data mining
data analysis
Intrusion Detection
pattern classification
neural nets
machine learning
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
network security
Data models
Classification algorithms
computer network security
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors
biblio
Lightweight Ciphers in Automotive Networks: A Preliminary Approach
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
lightweight cryptography
safe driving experience
preliminary approach
internal network
Electronic components
controller area network protocol
automotive security
automotive networks
controller area network
CAN protocol
controller area networks
weak point
computer network security
Lightweight Ciphers
controller area network security
microcontrollers
computer networks
Cybersecurity
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
A Hybrid Optimization Framework Based on Genetic Algorithm and Simulated Annealing Algorithm to Enhance Performance of Anomaly Network Intrusion Detection System Based on BP Neural Network
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
optimization strategy
learning rate
momentum term
network anomaly detection
network infrastructure attacks
network intrusion detection system
network security
neural nets
Neural networks
Intrusion Detection
optimized ANIDS based BPNN
pubcrawl
resilience
Resiliency
simulated annealing
simulated annealing algorithm
soft computing tool
Training
computer networks
Anomaly Detection
anomaly network intrusion detection system
back propagation neural network
Backpropagation
BP Neural Network
Classification algorithms
Compositionality
computer network security
ANIDS BPNN-GASAA
computer security
Cryptography
fitness value hashing
genetic algorithm
genetic algorithms
hash algorithms
hybrid optimization
biblio
Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
intrinsic content security
content communication
content naming
Content Replacement
content store data structure
Content Store Management
in-network caching
infotainment-rich commute experience
infrastructure network elements
cache replacement mechanisms
multimetric cache replacement policies
multimetric CS management mechanism
NDN-driven VANET
Vehicular Named Data Network
vehicular networks
vehicular social networks
VNDN communications
Named Data Network Security
social networking (online)
security
Resiliency
Human behavior
pubcrawl
Roads
vehicular ad hoc networks
simulation
Social network services
Scalability
internet
data structures
Measurement
computer networks
named data networking
cache storage
Intelligent Transportation System
Intelligent Transportation Systems
biblio
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Unsupervised Learning
variable length data sequence
sequential LSTM Neural Networks autoencoders
sequential intrusion detection
sequential data
sequential autoencoder
network data sequence
long short term memory neural network
GRU
fixed length data sequence
computer network intrusion detection
computer network data
Bi-LSTM
autoencoders
encoding
LSTM
computer network security
computer networks
Payloads
Intrusion Detection
Training
network intrusion detection
Neural networks
neural nets
Decoding
Metrics
Iterative methods
composability
pubcrawl
Resiliency
feature extraction
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Research of Computer Network Security Evaluation Based on Backpropagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Backpropagation
Neural Network Security
Virus
prediction
loopholes
evaluation
computer viruses
computer networks
computer network security evaluation
BP Neural Network
backpropagation neural network
security
Biological neural networks
Metrics
neural nets
Communication networks
Mathematical model
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »