Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Attack detection
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:38pm
security of data
Scalability
Classification algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
social networking (online)
internet
Libraries
Mathematical model
natural language processing
cyber security
Attack detection
social engineering
blacklisting
Forestry
future attacks
natural language processing steps
potential attacks
SEADer++ v2
social attacks
social engineering attacks detection
social networks potential hackers
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:00pm
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Computer crime
Entropy
composability
telecommunication traffic
SDN
software defined networking
Attack detection
Switches
microsoft windows
DDoS
network architecture
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service attack
DDoS attack detection method
control logic
DDoS traffic formation
forwarding logic
network cyber security
SDN networks
φ-entropy
biblio
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
Submitted by grigby1 on Wed, 02/10/2021 - 12:13pm
Cryptography
cyber security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cloud Computing
Attack detection
Cyber Attacks
Peer-to-peer computing
attack mitigation
blockchain platform
cloud-hosted applications
cyber threat intelligence sharing
DefenseChain implementation
DefenseChain system
distributed trust
Open Cloud testbed
reputation estimation scheme
reputation system
Threat intelligence sharing
uses Quality
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
security of data
Servers
Internet of Things
pubcrawl
composability
Databases
SQL
authentication
network topology
trustworthiness
Topology
Attack detection
MQTT
IoT object security
trustworthiness management
MySQL database
Object
on-off attack
On-offAttack
PHP database
time 0.5518318 s
trust value security
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
Cryptography
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Measurement
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
energy management
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
trust evaluation
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
biblio
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
Attack detection
automotive electronics
Cameras
car application
Human behavior
Human Factors
image matching
images comparisons
images processing
intrusion detection system
mobile robots
object detection
operating systems
Perturbation methods
policy-based governance
pubcrawl
real-time attack detection
resilience
Resiliency
Robot
robot cameras
Robot Operating System
robot operating systems
Robot vision systems
ROS
security
security assessment
security of data
self-driving cars
Service robots
telecommunication security
unsupervised anomaly detection method
biblio
An Enhanced Approach for Attack Detection in VANETs Using Adaptive Neuro-Fuzzy System
Submitted by grigby1 on Thu, 10/29/2020 - 10:24am
security
pubcrawl
Metrics
resilience
Resiliency
Throughput
quality of service
Protocols
Routing
telecommunication computing
Attack detection
VANETs
vehicular ad hoc networks
Compositionality
QoS
mobile ad hoc networks
adaptive neuro-fuzzy system
end to end delay
fuzzy neural nets
information dispersal approach
mobile ad hoc network
packet drop ratio
routing attacks
temporary network
vehicle-to-vehicle availability
MANET Attack Detection
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
IoT
security of data
Conferences
Internet of Things
security
Classification algorithms
feature extraction
Resiliency
pubcrawl
composability
optimization
Neurons
pattern classification
Training
optimisation
statistical analysis
classification
Attack detection
belief networks
Deep Belief Network
activation function optimization
attack detection system
DP management
feature classification process
feature extraction process
higher-order statistical features
Lion Algorithm
operational security
Proposed Feature Extraction
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
automobiles
Automotive engineering
security of data
traffic engineering computing
Internet of Things
telecommunication security
cyber-physical systems
Resiliency
pubcrawl
Roads
testing
Intrusion Detection
simulation
safety-critical software
Logic gates
Attack detection
controller area network
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
communication bus
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
biblio
An Improved Method of DDoS Attack Detection for Controller of SDN
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
computer network security
DDoS
telecommunication traffic
software defined networking
Resiliency
Human behavior
pubcrawl
composability
Metrics
SDN
SDN controller
recurrent neural nets
Attack detection
Software Defined Network
telecommunication control
distributed denial of service attacks
SDN environment
BiLSTM-RNN
BiLSTM-RNN neural network algorithm
controller overhead
DDoS attack feature
DDoS attack traffic detection
openflow switch
real-time DDoS detection attack method
DDoS attack detection
1
2
3
4
5
next ›
last »