Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos
biblio
A random number generation method based on discrete time chaotic maps
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
FPAA-FPGA
Steganography
statistical testing
statistical test
Resiliency
random number generator
random number generation method
random number generation
pubcrawl
piecewise linear techniques
piecewise linear one dimensional discrete time chaotic maps
NIST 800-22 randomness test
Metrics
Mathematical model
bifurcation
FIPS 140-2
field programmable gate arrays
field programmable digital arrays
field programmable analogue arrays
field programmable analog arrays
Entropy
Cryptography
Correlation
composability
chaotic signal
chaotic cryptography
chaos
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Entropy
Resiliency
pubcrawl
Mutual information
Metrics
Logistics
information security
Image color analysis
frequency-domain analysis
chaotic cryptography
encryption
Discrete Fourier transforms
digital images
Deterministic Encryption
Correlation
composability
chaotic encryption
biblio
Research on the design and implementation of two dimensional hyper chaotic sequence cipher algorithm
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Algorithm design and analysis
Builder FPGA
chaotic communication
chaotic cryptography
Chaotic sequence generator
Ciphers
component
composability
encryption
Entropy
Metrics
pubcrawl
Resiliency
Science of Security
Sequence cipher
Two dimensional hyper chaos
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Detecting Covert Channels in FPS Online Games
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Companies
Compositionality
covert channels
encoding
Entropy
Games
Online Games
pubcrawl
Receivers
Resiliency
Scalability
Servers
Training
biblio
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
source code (software)
Servers
security-sensitive metadata
security of data
Scalability
Resistance
Resiliency
pubcrawl
Probes
Metadata Discovery Problem
address space layout randomization
Layout
labor-intensive source code inspection
hidden application-specific primitives
Entropy
crash-resistant primitive automated discovery
crash-resistant code primitives
Computer crashes
Compositionality
binary executables
ASLR
biblio
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Intrusion Detection
Training
RNN infrastructure
resource exhaustion attack detection
Resiliency
replicator neural network infrastructure
pubcrawl
policy-based governance
Policy
Neural networks
neural nets
network profiling technique
learning (artificial intelligence)
anomaly-based intrusion detection
internet
Government
Governance
flow-based anomaly intrusion detection analysis
feature extraction
Entropy
deep learning technique
computer network security
Computational modeling
collaboration
Artificial Neural Networks
artificial neural network
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »