Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hypermedia
biblio
Framework for Creating Outdoors Augmented and Virtual Reality
Submitted by grigby1 on Tue, 01/25/2022 - 3:22pm
privacy
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Information systems
Solid modeling
virtual reality
augmented reality
Three-dimensional displays
navigation
hypermedia
merging
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
biblio
Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
learning (artificial intelligence)
Software Defined Security
software defined networking
security protection methods
security data platform
Scalable Security
scalable network anomaly detection module
Scalability
Resiliency
real-time online detection
real-time online anomaly detection
pubcrawl
Network Security Architecture
network data
network attack technology
network anomaly detection technology
Metrics
internet
hypermedia
deep learning-based network anomaly detection module
deep learning
data-driven software defined security architecture
data-driven security business orchestration
data-driven orchestration engine
data driven security business orchestration
computer network security
Big Data technology
Big Data
anomaly detection algorithm module
Dynamic Networks and Security
composability
biblio
Optimal Cache Placement and Migration for Improving the Performance of Virtualized SAND
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
software controlled virtualized DASH environments
resilience
Resiliency
SAND
SAND architecture
Scalability
SDN
SDN controller
Servers
Software
software controlled virtualized approaches
quality of experience
standards
Streaming media
video streaming
virtualisation
virtualized caches
virtualized DANEs
virtualized SAND deployments
Web Caching
web-caches
end-users
adaptive video techniques
Bandwidth
cache location algorithm
cache migration algorithm
cache storage
DANE
DASH
DASH Aware Network Elements
dominant Internet applications
pubcrawl
good foundation
high QoE
HTTP
hypermedia
internet
Metrics
MPEG standard
optimal cache placement
optimal locations
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 10:24am
HTTP botnet detection
transport protocols
Training
telecommunication traffic
Resiliency
resilience
pubcrawl
Peer-to-peer computing
P2P botnet detection
Metrics
malware
IRC botnet detection
IP networks
invasive software
Immune system
hypermedia
artificial immune system
DNS botnet detection
corporate area networks
computer systems
computer network security
Computer crime
Compositionality
clonal selection algorithm
Classification algorithms
botnets
Botnet detection
botnet
BotGRABBER system
benign network traffic
artificial immune systems
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
1
2
next ›
last »