Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
invasive software
biblio
Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:45pm
learning (artificial intelligence)
feature extraction
pubcrawl
Metrics
resilience
Resiliency
computer network security
Computational modeling
telecommunication traffic
composability
computer science
pattern classification
invasive software
Neural networks
Measurement
Biological neural networks
network intrusion detection
transport protocols
Advanced Security Network Metrics & Tunneling Obfuscations dataset
anomaly-based intrusion detection system
anomaly-based Network intrusion detection systems
direct network intrusion
direct network intrusions
legitimate network traffic
legitimate TCP communications
multiclass classification
multiclass classification baselines
multiclass classification NIDS
network intrusion detection system
obfuscated malicious TCP communications
obfuscated network intrusions
selected vulnerable network services
Signature-based Intrusion Detection System
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 12:39pm
learning (artificial intelligence)
CPS
cyber-physical systems
pubcrawl
resilience
Resiliency
ICs
SCADA systems
supervisory control and data acquisition systems
invasive software
CPS Security
multi-agent systems
cyber-attacks
cyber-physical systems security
game theory
Nash Equilibrium
CPS network
hybrid game theory
malware author
Multi-Agent Reinforcement Learning
multiagent reinforcement learning
Virus Spreading
Damage Assessment
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
Servers
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
internet
Computer crime
Entropy
composability
computer network management
telecommunication traffic
Floods
invasive software
telecommunication control
software defined networking
DDoS attack mitigation
botnet
transport protocols
denial-of-service attack
network flow data
DDoS attack detection
distributed denial of service
distributed denial of service attack
distributed source
HTTP attacks
network management complexity
Ping flood attack
slow HTTP attack
Software Defined Networks
TCP flags
TCP SYN flood attack
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
security
internet
online front-ends
invasive software
bitcoin
malware
cryptojacking
cash money
Chrome Web browser add-on application
Coin Mining
Coinhive
computer resources
cryptocurrency mining
digital currencies
Hidden Cryptocurrency Mining
hidden cryptocurrency mining activities
malicious mining activities
MiNo
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
internet
Computer crime
invasive software
Decision trees
Cybercrime
Ransomware
behavior-based detection
behavioral analysis
browser-based cryptojacking
complex detection technique
CPU load
cryptojacking
Cryptojacking detection
cryptojacking malware
cybercriminals
decision tree algorithm
detection program
executable-type cryptojacking
illegitimate profit
malicious mining
virtual machine environment
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 12:41pm
Scalability
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
convolution
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
cyber-criminals
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
automated attack classification
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
Honey Pot
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
low-cost routers
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
resilience
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
attacks
authentication
browser malware-injection attacks
Cloud Computing
cloud computing security attacks
common security breaches
Flooding Attacks
Honey Pot
Honey pot (computing)
honey pot attack
honey pots
Human behavior
Human Factors
intrusion
Intrusion Detection
Intrusion Detection Systems
invasive software
malware
procedural intrusion way
pubcrawl
resilience
Resiliency
Scalability
security
security issues
Servers
specific honey pot algorithm
Virtual machining
wrapping attacks
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
covert channels
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
CPU utilization
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
information embedding
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
Resiliency
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 10:27am
acoustic
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
composability
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
digital versatile discs
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
novel acoustic covert channel
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
1
2
3
4
5
6
7
8
9
…
next ›
last »