Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Immune system
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
insider threat
pubcrawl
Human behavior
Human Factors
Resiliency
computer network security
Mathematical model
Biological system modeling
Computational modeling
composability
malware
invasive software
Immune system
computer networks
Metrics
resilience
Atmospheric modeling
differential equations
Communication networks
Air gaps
air-gapped network
anti-virus
biologically based epidemic models
Computer worms
Epidemic model
Grippers
modified SEIQV model
Patching
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
security of data
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
Immune system
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
artificial immune systems
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
cheat nodes
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
Adaptive immune system
adaptive layer
bio-inspired framework
Biologically Inspired
biologically inspired architecture
computer network security
control layer
data layer
denial of service attack
DoS flooding attacks
DoS mitigation
dynamic network threats
human immune system
Immune system
Innate immune system
layer immune inspired framework
Mathematical model
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
SDN
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
searchable encryption
Artificial Intelligence
Big Data
Ciphers
Cryptography
embedded searchable encryption
encryption
Hamming distance
Human behavior
Human Factors
illegal attacks
Immune system
Indexes
medical computing
Medical services
Metrics
power analysis
Power demand
pubcrawl
Scalability
searchable encryption system
Security Evaluation
side channel attack
side-channel analysis
Tamper resistance
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
data privacy
Device-Connect-Manage
health care
healthcare industry
Human behavior
Human Factors
immune information security
Immune system
Industries
information security
internet of medical things
Internet of Things
IoMT
IoT
layered-security
layered-security model
medical field
Medical services
Metrics
privacy
pubcrawl
Resiliency
Scalability
security mechanisms
security of data
security threats
Ubiquitous Computing Security
Wearable Device
wearables security
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
Anomaly Detection
artificial immune system
artificial immune systems
composability
computer network security
computer networks
danger theory
Dendritic cell algorithm
dendritic cell algorithm enhancement
feature extraction
Fuzzy inference systems
Fuzzy logic
fuzzy reasoning
Fuzzy sets
genetic algorithms
Immune system
immune-inspired classification algorithm
Intrusion Detection Systems
Mutual information
network intrusion detection
pathogenic associated molecular pattern
pattern classification
pubcrawl
Resiliency
Sociology
Statistics
TSK+
TSK+ fuzzy inference system
biblio
Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
AAIDS
adaptable agent-based IDS
AG agent
agent-based artificial immune systems
artificial immune system
artificial immune systems
composability
Computational modeling
Computer hacking
computer network security
danger theory
DC agent
dendritic cell
dendritic cells
host-based intrusion detection systems
Immune system
Intrusion Detection
Intrusion Detection Systems
learning (artificial intelligence)
Learning systems
machine learning
multi-agent systems
multiagents system
network packets
pubcrawl
Resiliency
TC agent
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:57am
nodes act
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
Immune system
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
PAMP
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
security
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
artificial immune system
artificial immune systems
benign network traffic
BotGRABBER system
botnet
Botnet detection
botnets
Classification algorithms
clonal selection algorithm
Compositionality
Computer crime
computer network security
computer systems
corporate area networks
DNS botnet detection
HTTP botnet detection
hypermedia
Immune system
invasive software
IP networks
IRC botnet detection
malware
Metrics
P2P botnet detection
Peer-to-peer computing
pubcrawl
resilience
Resiliency
telecommunication traffic
Training
transport protocols
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
cyberattack
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
Cyber Attacks
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
end-to-end packet delay
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
SDN self-healing mechanisms
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
1
2
next ›
last »