Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
telecommunication network topology
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
Protocols
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
IPv4 addressing problems
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
attack
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
On-chip Data Security Against Untrustworthy Software and Hardware IPs in Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 11:42am
security of data
memory security
Metrics
microprocessor chips
on-chip memory blocks
pubcrawl
reconfigurable logic fabric
Resiliency
security
memory protection unit
security services
SoC FPGA
software IP
static detection methods
system-on-chip
third-party IP cores
third-party IPs
3PIP
memory protection design
memory access
low-latency hardware
IP networks
Intel DE1-SoC board
implementation
hierarchical top-down structure
Hardware
golden reference model
FPGA-based embedded systems
field programmable gate arrays
embedded systems
dual-core ARM processor
Cryptography
composability
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
HTTP botnet detection
transport protocols
Training
telecommunication traffic
Resiliency
resilience
pubcrawl
Peer-to-peer computing
P2P botnet detection
Metrics
malware
IRC botnet detection
IP networks
invasive software
Immune system
hypermedia
artificial immune system
DNS botnet detection
corporate area networks
computer systems
computer network security
Computer crime
Compositionality
clonal selection algorithm
Classification algorithms
botnets
Botnet detection
botnet
BotGRABBER system
benign network traffic
artificial immune systems
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 9:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Effective Botnet Detection Through Neural Networks on Convolutional Features
Submitted by grigby1 on Fri, 04/05/2019 - 9:23am
invasive software
Training
telecommunication traffic
Servers
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Payloads
P2P botnet datasets
Neural networks
Network traffic classification
Metrics
machine learning
learning (artificial intelligence)
IP networks
botnet
internet
feedforward neural nets
feed-forward artificial neural network
feature extraction
DDoS Attacks
cybercrimes
convolutional neural networks
convolutional features
convolution
computer network security
Computer crime
Compositionality
botnets
botnet detection system
Botnet detection
biblio
Software-Defined Networking for Improving Security in Smart Grid Systems
Submitted by aekwall on Mon, 03/18/2019 - 8:55am
Resiliency
wide-area security management
traditional smart grid systems
traditional smart grid architecture
software-defined networking
software defined networking
smart power grids
Smart Grids
smart grid security
Smart Grid
smart decision making
security of data
SDN-based smart grid systems
SDN based solutions
SDN
Scalability
attacks
pubcrawl
Protocols
power system security
power engineering computing
Metrics
mentioned security threats
main cyber-security objectives
IP networks
distributed security
Decision Making
cyber security
control systems
computer architecture
Big Data
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »