Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 11:22am
analysis
Computer crime
crime information visual system
crime management
crime monitoring
Crime Trace
Cryptography
dark web
data visualisation
Data visualization
Databases
deep web
deep Web visualization
drugs
Google
Human behavior
Human Factors
internet
Java
pubcrawl
search engines
security
Tors encryption client
unknown dark channels
visualization
biblio
Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics
Submitted by grigby1 on Fri, 01/15/2021 - 11:03am
Training
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
Scalability
internet
detection algorithms
Decoding
resilience
visualization
Image forensics
Image color analysis
Videos
video signal processing
DeepFake
AI-synthesized face-swapping videos
Celeb-DF
DeepFake detection algorithms
DeepFake forensics
DeepFake video dataset
online information trustworthiness
YouTube
biblio
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 12:37pm
computer network security
Scalability
telecommunication traffic
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
neural nets
internet
machine learning
Bandwidth
quality of service
convolutional neural networks
deep learning
Streaming media
network administrators
deep packet inspection
Network traffic classification
2-dimensional formulation
application network signatures
deep convolutional neural networks
Internet traffic classification
network traffic image orientation mappings
networking related tasks
packet flows
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Inspection
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
Software-Defined Networks
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
deep packet inspection approaches
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
deep neural networks
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
internet
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
OT Network
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
computer network security
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
internet
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
Payloads
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
fast intrusion detection
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
biblio
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
Scalability
Internet of Things
feature extraction
Resiliency
pubcrawl
internet
quality of service
convolutional neural networks
Virtual private networks
deep learning
social networking (online)
deep packet inspection
Application Identification
Multimedia Web sites
Per Application Classification
traffic characterization
VPN/Non-VPN Traffic Characterization
biblio
Evaluating Bad Hosts Using Adaptive Blacklist Filter
Submitted by grigby1 on Mon, 12/28/2020 - 11:47am
adaptive blacklist filter
adaptive filtering
adaptive filters
automated evaluation techniques
bad hosts
blacklists
computer network security
digital signatures
evaluator module
evidence capture
false positives
flow-based monitoring
incident evaluation
internet
Metrics
national backbone network
network flow data
pubcrawl
publicly available blacklists
resilience
Resiliency
Scalability
telecommunication traffic
unreliable alerts
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Big Data
big data privacy
Big data privacy top
big data security
Cloud Computing
cloud environment
cloud server
data privacy
Data Security
data security challenges
data storage
data structures
Human behavior
internet
Metrics
Organizations
pubcrawl
resilience
Resiliency
Scalability
security of data
security threats
semistructured data
sensitive data storage
Servers
storage management
Structured Data
Unstructured Data
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
differential privacy
pubcrawl
composability
Scalability
Resiliency
Human behavior
Algorithm
Big Data
big data privacy
Big Data privacy protection
data privacy
Data protection
differential privacy protection
differential privacy protection technology
Global Positioning System
GPS technology
internet
location based services
location trajectory
location trajectory Big Data
location trajectory privacy protection
Metrics
mobile computing
mobile Internet technology
position trajectory
resilience
social software
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »