Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computer network security
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by
aekwall
on Mon, 01/11/2021 - 12:37pm
computer network security
Monitoring
Scalability
telecommunication traffic
Internet of Things
security
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Decision Tree
Image edge detection
firmware
Decision trees
Cameras
Switches
IoT
deep packet inspection
dpi
behavior analysis
deep deviation detection
edge intelligence
ML
network traffic characteristics
poe
PoE-IoT classification
PoE-IoT devices
vulnerable IoT devices
biblio
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
Submitted by
aekwall
on Mon, 01/11/2021 - 12:37pm
computer network security
Scalability
telecommunication traffic
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
neural nets
internet
machine learning
Bandwidth
quality of service
convolutional neural networks
deep learning
Streaming media
network administrators
deep packet inspection
Network traffic classification
2-dimensional formulation
application network signatures
deep convolutional neural networks
Internet traffic classification
network traffic image orientation mappings
networking related tasks
packet flows
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by
aekwall
on Mon, 01/11/2021 - 12:36pm
computer network security
Scalability
telecommunication security
malware
Protocols
invasive software
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
neural nets
Neural networks
internet
cyber-attacks
Industries
integrated circuits
insider attacks
data acquisition
industrial control
data acquisition systems
deep neural networks
Deep Neural Network
deep packet inspection
automation industries
automation scenarios
behavior-based intrusion prevention system
DNP3
DoS attack
industry control system
intrusion prevention system
IPS system
Modbus
network threats
operational technology system elements
OT Network
OT networks
SCADA test bed
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by
aekwall
on Mon, 01/11/2021 - 12:35pm
computer network security
deep packet inspection
deep packet inspection system
dpi
DPI software system
Hurst flow parameter
Hurst parameter
information protocol.
Internet of Things
Intrusion Detection
IoT
IoT traffic
network attacks
network provider
network security
network traffic
network traffic analysis
pubcrawl
Resiliency
Scalability
telecommunication traffic
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by
aekwall
on Mon, 01/11/2021 - 12:35pm
computer network security
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
internet
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
Payloads
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
fast intrusion detection
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
biblio
Remote Access Control Model for MQTT Protocol
Submitted by
aekwall
on Mon, 01/11/2021 - 12:32pm
security
computer network security
Scalability
authorisation
Internet of Things
Cryptographic Protocols
pubcrawl
privacy
MQTT
MQTT protocol
secure access control
access control model
access matrix
access privileges
data transferring
device discretionary access control model
Internet of Things security problems
OAuth protocol
remote access control model
third-party services
TLS protocol
data deletion
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by
grigby1
on Mon, 12/28/2020 - 12:01pm
security of data
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
wireless LAN
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
covered direction-finding
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
packet loss avoidance
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
biblio
Evaluating Bad Hosts Using Adaptive Blacklist Filter
Submitted by
grigby1
on Mon, 12/28/2020 - 11:47am
adaptive blacklist filter
adaptive filtering
adaptive filters
automated evaluation techniques
bad hosts
blacklists
computer network security
digital signatures
evaluator module
evidence capture
false positives
flow-based monitoring
incident evaluation
internet
Metrics
national backbone network
network flow data
pubcrawl
publicly available blacklists
resilience
Resiliency
Scalability
telecommunication traffic
unreliable alerts
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by
grigby1
on Mon, 12/28/2020 - 11:28am
address randomization
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
BT spectrum analysis
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
high data rates
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
resilience
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by
grigby1
on Mon, 12/28/2020 - 11:27am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
error statistics
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
communicating devices
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
MITM Attack
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
1
2
3
4
5
6
7
8
9
…
next ›
last »