Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network security
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
learning (artificial intelligence)
security of data
cyber security
pubcrawl
Resiliency
computer network security
Artificial Intelligence
intrusion detection system
composability
network security
Attack detection
computer networks
resilience
cyber-attacks
IDS
accurate intrusion detection
anomaly-based IDS
artificial intelligence & machine learning algorithms
complex & increasing tasks
computer safety hazards
current IDS
detect attack
ID
identifying attacks
machine learning algorithms
multiple machine learning algorithms
NSL-KDD
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
biblio
Analysis of Computer Network Information Security under the Background of Big Data
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
data analysis
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
computer network security
Conferences
network security
Scalability
internet
data acquisition
information system
Big Data
composability
Smart Grids
parallel computing
Xenon
mining
security perception
Quality function deployment
Hafnium compounds
OWL
Information Assurance
big data acquisition
big data analysis platform
Big Data technology
comprehensive arrival
computer network information security
data subject
distributed computing
Frequency locked loops
information security assurance services
Internet era
large-scale network environment
large-scale network security situational awareness
people
Situation Awareness
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
active directory
antivirus software
APT attack chain
Attack detection
Chained Attacks
common domain intrusion methods
Communication networks
Computer crime
Computer hacking
computer network security
Databases
domain attack detection rules
domain control
domain intrusion detection system
domain related attack behavior characteristics
effective market-oriented products
feature extraction
Forgery
log file
network attack detection method
network security
network security threats
normal attack
pubcrawl
real-time systems
resilience
Resiliency
Scalability
security protection
tools
biblio
Network Security System on Multiple Servers Against Brute Force Attacks
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
brute force attacks
Communication networks
Databases
Fail2ban
Force
Human behavior
Human Factors
IDPS
IDS
IP networks
Monitoring
network security
policy-based governance
pubcrawl
security
Servers
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 2:36pm
Anomaly Detection
brute force attacks
brute-force
Computer Network Attacks
computer network security
deep learning
deep learning.
Dictionaries
dictionary-based brute-force attacks
FTP
high-level attacks
Human behavior
Human Factors
internet
Intrusion Detection
learning (artificial intelligence)
long short-term memory deep learning approach
LSTM
machine learning
machine learning algorithms
machine learning approaches
machine learning classifiers
MLP
network security
network traffic anomaly detection
password
pattern classification
policy-based governance
pubcrawl
SSH
telecommunication traffic
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
benign P2P hosts
botnet
botnets
composability
computer network security
detection
feature extraction
invasive software
machine learning
Metrics
Monitoring
network security
p2p
Payloads
Peer-to-peer computing
pubcrawl
real-time systems
resilience
Resiliency
software engineering
statistical analysis
statistical feature
telecommunication traffic
traffic statistical features
two-stage P2P botnet detection method
unsolicited e-mail
biblio
Hybrid System to Minimize Damage by Zero-Day Attack based on NIDPS and HoneyPot
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
composability
convergence
cyber attack
defense
honeypot
information and communication technology
Metrics
network security
NIDPS
pubcrawl
real-time systems
resilience
Resiliency
Zero day attacks
zero-day
biblio
Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
Resiliency
Scalability
Black hole attack
Blackhole attack
composability
Internet of Things
Metrics
network security
pubcrawl
quality of service
Routing
security
Throughput
Wireless communication
Wireless Mesh Network Security
Wireless Sensor Network
wireless sensor networks
Zigbee
zigbee 802.15.4
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
Using Deep Learning Techniques for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
learning (artificial intelligence)
feature extraction
machine learning
CNN
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
network security
recurrent neural nets
composability
deep learning
convolutional neural networks
recurrent neural network
Recurrent neural networks
network intrusion detection
deep learning techniques
neural network
convolutional neural network
cyber-security attacks
intelligent network intrusion detection system
network intrusion attacks
RNN
1
2
3
4
5
6
7
8
9
…
next ›
last »