Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IDS
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by
grigby1
on Wed, 01/20/2021 - 3:22pm
API
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
hybrid feature selection
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
K-NN
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
performance indicator metrics
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by
grigby1
on Mon, 12/28/2020 - 12:01pm
ad hoc network
Ad hoc networks
component
Compositionality
fixed wired network
IDS
infrastructure-less networks
intrusion detection system
intrusion detection techniques
MANETs
Metrics
mobile ad hoc networks
mobile adhoc networks
mobile radio
network protocols
Network Simulator-2
Network-based anomaly intrusion detection system
pre-existing unfolding solutions
pubcrawl
resilience
Resiliency
Routing protocols
security
security of data
telecommunication security
wired environment
wireless Adhoc networks
wireless network
wireless networks
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by
grigby1
on Tue, 12/01/2020 - 12:48pm
adversarial attacks thwarting
Adversarial Machine Learning
adversarial ML attack
adversarial perturbations
adversary
anomalous traffic
composability
computer network security
feature extraction
Gallium nitride
gan
generative adversarial networks
IDS
intrusion detection system
malicious intrusions
malicious network traffic
malware
ML models
ML-based IDS
network intrusion detection systems
network security suite
Perturbation methods
Probes
pubcrawl
resilience
Resiliency
Robustness
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by
grigby1
on Tue, 12/01/2020 - 12:47pm
Bayes methods
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
feature dimensionality reduction approach
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
IP networks
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
network traffic
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by
grigby1
on Tue, 12/01/2020 - 12:47pm
Access controls
authorisation
Big Data
composability
cyber world
deep learning
deep learning algorithms
deep learning based intrusion detection system
dynamic intrusion detection mechanism
encryption mechanisms
firewalls
GPUs
graphics processing units
IDS
IDS on GPU
IDS system
information security market
Intrusion Detection
intrusion detection system
learning (artificial intelligence)
market computers
modern learning mechanism
neural nets
neural network approach
optimization functions
parallel computing
password protections mechanisms
pubcrawl
real-world operations
resilience
Resiliency
security breaches
biblio
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
Submitted by
grigby1
on Tue, 12/01/2020 - 12:47pm
auto-encoders
composability
feature extraction
Feature Selection
IDS
IDS attacks
Intrusion Detection
intrusion detection system
learning (artificial intelligence)
Mathematical model
MATLAB
MATLAB2018
pubcrawl
radial basis function
radial basis function networks
RBF
RBF training
RBF-based multistage autoencoders
resilience
Resiliency
security of data
Support vector machines
testing
Training
biblio
High Performance Data Encryption with AES Implementation on FPGA
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
AES
AES encryption algorithm
AES implementation
Big Data
BIGDATA
composability
Cryptography
Data Security
encryption
encryption speed
field programmable gate arrays
FPGA
high performance data encryption
high speed
IDS
intrusion detection system
low latency
Pipelines
pubcrawl
Random access memory
resilience
Resiliency
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
Bandwidth
bandwidth resource
composability
Computer crime
computer network security
data communication
Data Transmission
DDoS
DDoS attackers
defense
denial-of-service attack
global coverage
ground networks
IDS
internet
intrusion detection system
large-scale traffic DDoS threat
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
satellite networks
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
biblio
Reduction of traffic between switches and IDS for prevention of DoS attack in SDN
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
pubcrawl
centralized controller
composability
computer network security
denial of service (dos)
DoS attack
end-to-end traffic
IDS
IDS delays
intrusion detection system
Intrusion Detection System (IDS)
malicious packets
resilience
Resiliency
SDN
Software Defined Network (SDN)
software defined networking
software-defined network
telecommunication congestion control
telecommunication switching
telecommunication traffic
biblio
Proposed security by IDS-AM in Android system
Submitted by
grigby1
on Tue, 12/01/2020 - 12:45pm
pubcrawl
android
Android OS
Android system
attacks
composability
Data mining
feature extraction
IDS
IDS-AM
Intrusion Detection
intrusion detection system
malicious behavior
malware
mobile agents
mobile computing
mobile environment
mobile systems
Monitoring
resilience
Resiliency
security of data
smart phones
1
2
3
4
5
6
7
8
9
next ›
last »