Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Filtering
biblio
Detection of Phishing Attacks
Submitted by
grigby1
on Tue, 11/26/2019 - 2:48pm
Anti Phishing Simulator
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
detection problem
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
identity theft
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
Phishing
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by
aekwall
on Tue, 10/22/2019 - 8:53am
computer network security
IP networks
authorisation
pubcrawl
policy-based governance
Filtering
Correlation
Communication networks
computer networks
network security
IPsec
Logic gates
Firewalls (computing)
security policy
Virtual private networks
internetworking
Conflicts analysis
firewall
Firewall Security policy analysis
formal verification
IPsec gateways
IPsec security policy analysis
network safety
network security protection
policy analysis
Security policy anomalies
security policy management
security policy misconfigurations
security policy verification
traffic control
Security Policies Analysis
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by
aekwall
on Mon, 06/10/2019 - 9:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers
Submitted by
aekwall
on Mon, 02/25/2019 - 10:42am
Scalability
Bayes methods
Classification algorithms
learning (artificial intelligence)
Human behavior
pubcrawl
Metrics
Neural networks
pattern classification
unsolicited e-mail
spam detection
Unsolicited electronic mail
electronic messaging
spam messages
machine learning
Filtering
CAP curve
content based advertisement
content-based machine learning techniques
deep learning methods
detection
filtering spam emails
information filtering
machine learning classifiers
phones
short message service
smart phones
Spam SMS
spam SMS detection
stylistic features
text messages
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by
aekwall
on Mon, 02/25/2019 - 10:42am
Analytical models
Bayes methods
content information
e-mail communication
e-mail filtering
Filtering
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning methods
Metrics
naïve Bayes classifier
offensive content
pattern classification
Postal services
pubcrawl
Scalability
security of data
spam detection
spam e-mails
spam filtering
unsolicited e-mail
Unsolicited electronic mail
vector space model
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by
grigby1
on Thu, 01/31/2019 - 11:13am
Air gaps
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Filtering
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
Metrics
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
safest places
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by
grigby1
on Mon, 01/21/2019 - 11:27am
Acoustic Fingerprints
Acoustic signal processing
audio fingerprint
audio retrieval
audio signal processing
audio track
composability
distortion
Filtering
fingerprint matching
Fingerprint recognition
Human behavior
ideal audio retrieval method
Indexes
information retrieval
LSH
massive audio dataset
noise distortions
Philips-like fingerprints
pubcrawl
Resiliency
Resistance
Resists
retrieval performance
Sampling and Counting Method
state-of-the-art audio retrieval method
state-of-the-art methods
time-stretch
time-stretch resistance
Turning
turning point alignment method
biblio
Detection of DDoS attack via deep packet analysis in real time systems
Submitted by
grigby1
on Wed, 09/12/2018 - 10:25am
Computer crime
computer network security
Cyber Attacks
cyber security
Databases
DDoS Attack
deep packet analysis
deep packet inspection
Filtering
internet
Internet technologies
known attack patterns
Libraries
Monitoring
packet filtering
pubcrawl
Radiation detectors
real time systems
real-time systems
resilience
Resiliency
Scalability
telecommunication traffic
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by
grigby1
on Wed, 05/30/2018 - 3:11pm
Adaptation models
Agent technology
common preference group recommendation
common preference group recommendation strategy
computer architecture
Data mining
Data models
equilibrium selection
Filtering
Human behavior
Human Factors
information retrieval
intelligent social tagging recommendation system
multi-agent systems
personalized recommendation
personalized recommendation strategy
pubcrawl
recommender systems
resource management
Scalability
self-adaptive recommendation
self-adaptive recommendation strategy
Servers
Social Agents
social networking (online)
social tagging recommendation
social tagging users
tagging
user interest mining
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by
grigby1
on Mon, 03/26/2018 - 11:58am
Authorize Application
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
firewalls
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
network attacks
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
Protocols
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
1
2
3
next ›
last »