Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Snort
biblio
Efficient Memristor-Based Architecture for Intrusion Detection and High-Speed Packet Classification
Submitted by
grigby1
on Tue, 11/19/2019 - 2:41pm
composability
deep packet inspection
hardware architectures
memristor crossbars
Metrics
network security
packet classification
power grid vulnerability analysis
pubcrawl
range matching
resilience
Resiliency
router
Snort
string matching
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by
grigby1
on Mon, 11/19/2018 - 11:24am
Broadcasting
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Human Factors
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
Linux open source operating system
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
security tools
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
Cloud Computing
cloud environment
Cloud Security
cloud-computing technology
collaboration
composability
computer architecture
cost services
Dynamic Malware Analysis
Honeypot Network
honeypot networks
Intrusion Detection
invasive software
malicious attacks
malware
Malware Analysis
network intrusion detection system
network intrusion detection systems
NIDS module
openstack
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Ports (Computers)
pubcrawl
sandboxing
sandboxing environment
Servers
Signature-based detection
Snort
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by
BrandonB
on Fri, 05/01/2015 - 7:38am
AC
arrays
automata
automata theory
automata-based multiple string matching algorithms
bit-vector
ClamAV
factor searching-based algorithms
factor-searching-based multiple string matching algorithm
huge memory usage
Intrusion Detection
matching speed
multiple string matching
network intrusion detection systems
pattern matching
SBDM
SBOM
security of data
Snort
space complexity
space-efficient
space-efficient multiple string matching algorithm BVM
string matching
succinct hash table
synthetic rules
Time complexity
URL blacklist
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by
BrandonB
on Thu, 04/30/2015 - 11:49am
AC
arrays
automata
automata theory
automata-based multiple string matching algorithms
bit-vector
ClamAV
factor searching-based algorithms
factor-searching-based multiple string matching algorithm
huge memory usage
Intrusion Detection
matching speed
multiple string matching
network intrusion detection systems
pattern matching
SBDM
SBOM
security of data
Snort
space complexity
space-efficient
space-efficient multiple string matching algorithm BVM
string matching
succinct hash table
synthetic rules
Time complexity
URL blacklist