Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Entropy
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
anomaly based IDS
computer network security
discretization
Entropy
entropy based discretization technique
feature extraction
Hidden Markov models
IDS systems
Intrusion Detection
intrusion detection system
machine learning
network attack
network intrusion detection system
network packets
Network reconnaissance
networking technologies
principal component analysis
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Training
Training data
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:00pm
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Computer crime
Entropy
composability
telecommunication traffic
SDN
software defined networking
Attack detection
Switches
microsoft windows
DDoS
network architecture
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service attack
DDoS attack detection method
control logic
DDoS traffic formation
forwarding logic
network cyber security
SDN networks
φ-entropy
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
Internet of Things
feature extraction
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
IoT devices
internet
Computer crime
Entropy
composability
real-time systems
Protocols
SDN
software defined networking
Switches
computer networks
DDoS attack detection
software-defined networking
categorized partial-flows
DDoS attack detection capabilities
OpenFlow
openflowbased switch capabilities
packet count entropies
Partial flow
real-time entropy features
SDN technology
biblio
A DDoS Attack Detection Method Based on Information Entropy and Deep Learning in SDN
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
learning (artificial intelligence)
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
deep learning
Entropy
composability
telecommunication traffic
DDoS Attacks
SDN
software defined networking
information entropy
control plane
DDoS attack detection
data plane
Software Defined Network
convolutional neural network model
DDoS attack detection method
DDoS attack traffic
fine-grained packet-based detection
information entropy detection
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
Servers
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
internet
Computer crime
Entropy
composability
computer network management
telecommunication traffic
Floods
invasive software
telecommunication control
software defined networking
DDoS attack mitigation
botnet
transport protocols
denial-of-service attack
network flow data
DDoS attack detection
distributed denial of service
distributed denial of service attack
distributed source
HTTP attacks
network management complexity
Ping flood attack
slow HTTP attack
Software Defined Networks
TCP flags
TCP SYN flood attack
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
security
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
Entropy
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
network security threats
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
dynamic threshold
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 1:01pm
3D cover images
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
Image coding
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
message security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
biblio
A Review of Recent Trends on DNA Based Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 12:53pm
encryption
security
Resiliency
Human behavior
pubcrawl
Cryptography
Logistics
privacy
Entropy
DNA
RSA
Predictive Metrics
encoding
chaos
AES
Biomedical imaging
image encryption
DNA cryptography
DNA encoding
Medical Image
Multi Image Encryption
SHA
biblio
Chaos-based Image Encryption using Integer Wavelet Transform
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
Cryptography
encryption
Resiliency
Human behavior
pubcrawl
privacy
Entropy
Signal processing algorithms
Predictive Metrics
Histograms
Image Processing
chaotic map
cryptanalysis
wavelet transforms
DNA cryptography
bit scrambling
chaos-based image encryption techniques
DNA-coding based encrypting methods
feebler resistance
GBS
global bit scrambling
hyperchaotic mapping
image decryption algorithm
Integer Wavelet Transform
IWT
key-dependent bit scrambling
biblio
Encryption of the Images on the Basis of Two Chaotic Systems with the Use of Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Scalability
Resiliency
Metrics
Fuzzy Cryptography
chaos
chaotic cryptography
chaotic encryption
chaotic map
Chaotic Mapping
Chaotic systems
correlation coefficient
Cryptography
digital cryptography
Entropy
Fuzzy logic
fuzzy logic encryption
Image coding
image encryption system
pseudorandom sequences
pubcrawl
statistical analysis
1
2
3
4
5
6
7
8
9
…
next ›
last »