Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Cyber security analysis using vulnerability assessment and penetration testing
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Penetration Testing
vulnerability assessment and penetration testing techniques
Vulnerability Assessment and Penetration Testing (VAPT)
vulnerability assessment
VAPT
testing
Technological innovation
technical assets
Sql Injection (SQLi)
security patches
security of data
security loopholes
security
Resiliency
pubcrawl
Browsers
Organizations
Market research
Human behavior
hacking activities
date security measurement
cyber-attacks
cyber threats
cyber security awareness
cyber security analysis
cyber security
Cross-site scripting (XSS)
Cross Site Scripting
Conferences
composability
biblio
How to find and fix software vulnerabilities with coverity static analysis
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
composability
computer security
Conferences
Cross Site Scripting
Human behavior
IEEE 802.11 Standard
pubcrawl
real-time systems
Resiliency
Software
Virtual machining
biblio
XSS detection with automatic view isolation on online social network
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
social networking (online)
OSN
OSN-based Web application
pubcrawl
Radio frequency
Request Authentication
Resiliency
security of data
Session
online social network
string value extraction
Uniform resource locators
Web page
XSS attack vector repository
XSS attack vectors
XSS cheat sheet
XSS detection
authentication
malicious code
Isolators
internet
Humhub
Human behavior
false positive rate
false negatives rate
Decision support systems
Cross-site scripting (XSS)
cross-site scripting
Cross Site Scripting
Consumer electronics
Conferences
composability
automatic view isolation
biblio
How to represent IPv6 forwarding tables on IPv4 or MPLS dataplanes
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
IPv6 FIB
telecommunication network routing
Silicon
Resiliency
pubcrawl
parallel processing
multiprotocol label switching
MPLS dataplanes
Metrics
Memory management
memory footprint
lookup time
IPv6 forwarding tables
Abstraction Layer
IPv4
IP networks
Internet routing ecosystem
internet
Human behavior
Heuristic algorithms
Conferences
collaboration
clean slate architectures
clean slate
classification width
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Extracting network connections from Windows 7 64-bit physical memory
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
Network connections
word length 64 bit
Windows 7 physical memory
user interfaces
user credentials
resource management
remote addresses
Random access memory
RAM
pubcrawl170109
Ports (Computers)
port information
Pool Allocations
Physical Memory
network connections extraction
chats
messages
Memory Forensics
memory dump
local IP addresses
Live Forensics
kernel data structures
Forensics
Digital Forensics
data structures
cyber forensics investigation
cyber crime investigation
Conferences
Computers
biblio
A game-theoretic approach for minimizing security risks in the Internet-of-Things
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
optimal prosumer set
user data theft
two player game
Silicon
security risk minimization
security of data
security
pubcrawl170108
pubcrawl170107
prosumers selection Game
Cascading style sheets
noncooperative game
Nash prosumers selection
Nash Equilibrium
Internet of Things
Games
game theory
decision support
Conferences
biblio
"Video Streaming Using Dual-Channel Dual-Path Routing to Prevent Packet Copy Attack"
Submitted by grigby1 on Tue, 02/14/2017 - 12:40pm
transport layer
packet copy attack prevention
pubcrawl170102
receiver side
Routing
Routing protocols
scrambled frame pixels
scrambling
sender side
optimistic refined approach
video buffer
video coding
video encryption
video merging
video reconstruction
video streaming
video transmission
Communications technology
network layer routing protocol
multiple unsecured hops
multi path
multi hop
MATLAB
malicious forwarding logic
IPTV
Image reconstruction
illegally copied video data
dual-channel dual-path routing
dual channel
Cryptography
Conferences
computer network security
computational intelligence
biblio
"Circuit design to improve security of telecommunication devices"
Submitted by grigby1 on Tue, 02/14/2017 - 12:28pm
military forces
tunneling
TETRA
Telecommunication standards
telecommunication security
telecommunication devices
telecommunication device security
Telecommunication
SusTech
security
radio networks
radio equipment
pubcrawl170102
project 25
5G mobile communication
Iron
GSM
exclusive channel
encryption
economical circuit
Design Circuit
Cryptography
Conferences
coding
circuit design
attackers
Artificial Intelligence
accidental damage
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
« first
‹ previous
…
73
74
75
76
77
78
79
80
81
next ›
last »