Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
pubcrawl
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
security of data
Cyber-security
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Protocols
delays
malware
advanced persistent threat
APT
synchronisation
cyber-attacks
Synchronization
Degradation
Clocks
advanced persistent threats
computer clocks
IEEE 1588
precision time protocol
programmable injector device
programmable Man-in-the-Middle
PTP
PTP infrastructure components
PTP time synchronisation networks
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
security of data
Intrusion Detection Systems
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Scalability
network security
advanced persistent threat
APT
IDS
graph model
data visualisation
coordinated attacks
security analysts
advanced persistent threats
alert graphs
community detection
event feature embeddings
feature embeddings
Graph Models
IP address
IP2Vec
persistent attacks detection
unsupervised clustering
word embedding
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Cryptography
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
cyberattacks
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
Long short-term memory
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
DeCrypto Pro
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Internet of Things
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Scalability
Decision Making
SDN
software defined networking
software-defined networking
computer networks
advanced persistent threat
APT
Reinforcement learning
active threat mitigation
ad-hoc solutions
ATMoS
autonomous network systems
autonomous threat mitigation
global network view
network behaviour
network security management
neural fitted Q-learning agent
RL-based threat mitigation
sequential decision making problems
threat vectors
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
tools
learning (artificial intelligence)
security of data
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Conferences
Scalability
Trojan horses
Measurement
advanced persistent threat
APT
Zero-day attacks
graph theory
detection accuracy
APT attacks
advanced persistent threat detection
attack campaigns
benign tools
deep learning method
high profile information
online adaptive metric learning
provenance graph
TPR
true positive rate
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
8-bit ASCII code
adaptive signal processing
bandwidth allocation
chaos
chaos-based cryptography
chaotic communication
chaotic nonautonomous Duffing oscillator
Communication channels
crypto-analysis methods
Cryptography
Encryption technique
internet
Lyapunov methods
Lyapunov-based adaptive technique
Multimedia communication
multimedia data
multimedia signals
multiple chaotic orbits
network security
Oscillators
public communication channel
Receivers
telecommunication channels
time series
Transmitters
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
cellular radio
cellular technologies
chaotic algorithm
chaotic communication
Cryptography
dynamic keys
encryption
end-to-end voice encryption
Global System for Mobile
GSM
GSM network
military radio
multicircular permutations
multiple circular
multiple circular chaotic permutation
Receivers
security systems
telecommunication security
telecommunication technology
trunked radio
voice communication
voice data security
voice encryption
wireless mobile communication
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
4-dimension chaotic system
chaotic communication
chaotic cryptosystem
chaotic cryptosystem solution
computer network security
Cryptographic Protocols
Cryptography
data phase transfer
DH-HEMTs
field programmable gate arrays
FPGA
FPGA implementation
IKE
IKE protocol
internet
Internet key exchange protocol
IPsec
IPSec protocol
keys phase exchange
man in the middle attack
network communication domain
network protocol
Protocols
SA
securing communications
security association attack
Synchronization
word length 128 bit
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
chaotic cryptography
pubcrawl
AES algorithm
AES encryption algorithm
carrier transmission on power lines
Chebyshev approximation
Cryptographic Protocols
encryption
key expansion process
narrowband power line communication protocol
Power line communications
PRIME protocol
Protocols
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
chaotic cryptography
pubcrawl
AES cipher
AES ciphering
chaos
Chaotic maps
chaotic neural network approach
chaotic neural networks
Cryptography
neural nets
short plaintexts
text encryption
1
2
3
4
5
6
7
8
9
…
next ›
last »