Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
botnet
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
basic network security goals
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
Data models
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
Long short-term memory
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Reliability
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
Servers
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
internet
Computer crime
Entropy
composability
computer network management
telecommunication traffic
Floods
invasive software
telecommunication control
software defined networking
DDoS attack mitigation
botnet
transport protocols
denial-of-service attack
network flow data
DDoS attack detection
distributed denial of service
distributed denial of service attack
distributed source
HTTP attacks
network management complexity
Ping flood attack
slow HTTP attack
Software Defined Networks
TCP flags
TCP SYN flood attack
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
botnet
Servers
malware
invasive software
mobile computing
feature extraction
Human behavior
pubcrawl
Mobile handsets
Cryptography
internet
Training
electronic messaging
Anomaly Detection
anomaly detection technique
dynamic analysis
SMS messages
detect SMS botnets
mobile botnets
one-class classification
SMS botnet
SMS spammer botnets
SMS stealer botnets
SMSBotHunter
Human Behavior and Cybersecurity
biblio
Whispering Botnet Command and Control Instructions
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
Cryptography
blockchain
Peer-to-peer computing
pubcrawl
Resiliency
computer network security
internet
Protocols
invasive software
botnets
Metrics
Compositionality
botnet
command and control systems
bidirectional botnet command and control operations
C&c
control bots
dark communication strategy
peer-to-peer communication infrastructure
radar communication
stealthy communication methods
whisper
whispering botnet command and control instructions
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
feature extraction
pubcrawl
Resiliency
computer network security
Correlation
invasive software
botnets
Metrics
Compositionality
Dictionaries
ROC curve
botnet
feedforward neural nets
Hidden Markov models
Botnet detection
C&C server
DGA
DGA-based botnets
Domain Flux
domain flux-based botnets
domain flux-based DGA botnet detection
domain generation algorithm
edit distance
feedforward neural network
frequency-domain analysis
HMM
neural network
real-world domain names
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
computer architecture
Internet of Things
IoT
pubcrawl
Resiliency
computer network security
IoT devices
performance evaluation
data privacy
Computer crime
invasive software
botnets
Metrics
Compositionality
Software systems
botnet
architectural features
botnet behavior
botnet prevention
botnet threats
Internet of Things botnets
IoT botnets activity
private Internet of Things network
private IoT networks
private networks
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
computer architecture
Internet of Things
IoT
pubcrawl
Resiliency
computer network security
IoT devices
malicious actors
Computer crime
malware
invasive software
botnets
distributed denial of service attacks
Metrics
DDoS
Proposals
Cybersecurity
Compositionality
defense
architecture
botnet
computationally limited devices
defense proposals
IoT botnet architectures
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
tools
Intrusion Detection
IP networks
pubcrawl
Resiliency
computer network security
intrusion detection system
network security
invasive software
botnets
Metrics
Compositionality
genetic algorithms
genetic algorithm
botnet
Biological cells
botnet attack detection
botnet detection system
host-based intrusion detection system
modern malware
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
learning (artificial intelligence)
machine learning
machine learning algorithms
pubcrawl
Resiliency
computer network security
internet
Protocols
standards
invasive software
botnets
vehicular ad hoc networks
Metrics
Compositionality
road safety
Intrusion Detection
botnet
collision avoidance
adaptive detection mechanism
efficiency 77.0 percent
inter-vehicular communications
Internet botnets
Reputation-Based Security
SHIELDNET
VANET Security
vehicular botnet attacks
vehicular botnet communication
vehicular botnets
vehicular bots
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
pubcrawl
Resiliency
computer network security
internet
architecture
Computer crime
invasive software
botnets
DDoS Attacks
Metrics
optimisation
Compositionality
combinatorial optimization
attack techniques
botmaster
Botnet detection
botnet detection accuracy
botnet developers
Centralized
centralized architecture-based botnets
centralized botnet architecture
Detecting
deterministic
nondeterministic polynomial-time hardness
NP-hard problem
traveling salesperson person
travelling salesman problems
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
TSP-NP hard problem
botnet
1
2
3
4
5
6
7
next ›
last »