Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Machine Learning Based DDOS Detection
Submitted by grigby1 on Tue, 09/07/2021 - 1:59pm
Classification algorithms
composability
Computer crime
Computer hacking
DDoS attack detection
DDoS detection
Floods
Human behavior
machine learning
machine learning algorithms
Metrics
pubcrawl
resilience
Resiliency
Servers
biblio
Enhancing Security Measures of AI Applications
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
applications
Artificial Intelligence
Computer hacking
cyber security
defenses
Future
Proposals
pubcrawl
Reliability
resilience
Resiliency
robots
Scalability
Security by Default
biblio
A New Security Framework for Remote Patient Monitoring Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
medical devices
wearables security
Wearable Device
Virtualization
Ubiquitous Computing Security
Scalability
resilience
remote attacks
pubcrawl
Protocols
Pacemakers
moving target defense
virtualization privacy
IP networks
internet
Human Factors
Computer hacking
Bluetooth jamming
Biomedical monitoring
Human behavior
privacy
Metrics
composability
Resiliency
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
hacker forums
Semantics
pubcrawl
privacy
machine learning algorithms
Long short-term memory
knowledge transfer
Knowledge engineering
Human Factors
Human behavior
Generative Adversarial Learning
generative adversarial networks
dark web
cross-lingual knowledge transfer
Computer hacking
adversarial learning
Scalability
Predictive Metrics
Resiliency
biblio
Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups
Submitted by aekwall on Mon, 01/11/2021 - 1:38pm
Guidelines
International Affairs
Focusing
Entertainment industry
cyber deterrence
Contestability
ATT&ck
Grippers
Deterrence
Scalability
information and communication technology
attribution
Computer hacking
pubcrawl
Human behavior
Resiliency
malware
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »