Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnets
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Effective Botnet Detection Through Neural Networks on Convolutional Features
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
invasive software
Training
telecommunication traffic
Servers
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Payloads
P2P botnet datasets
Neural networks
Network traffic classification
Metrics
machine learning
learning (artificial intelligence)
IP networks
botnet
internet
feedforward neural nets
feed-forward artificial neural network
feature extraction
DDoS Attacks
cybercrimes
convolutional neural networks
convolutional features
convolution
computer network security
Computer crime
Compositionality
botnets
botnet detection system
Botnet detection
biblio
Mitigating IoT Insecurity with Inoculation Epidemics
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
botnet
epidemic
Human behavior
inoculation
IoT
metric
pubcrawl
Resiliency
threat mitigation
botnets
biblio
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
botnets
honey pots
Human Factors
Intrusion Detection
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
biblio
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
botnets
Cybersecurity
Human behavior
Metrics
Nonparametric Bayesian Methods
pubcrawl
resilience
Resiliency
Scalability
signature based defense
spam detection
biblio
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Monitoring
Webcams
Trojan horses
tools
Resiliency
remote attackers interactive control
remote access trojans
remote access trojan
Rats
RAT malware
RAT
pubcrawl
botnets
Metrics
invasive software
interactive systems
human operator interaction
human computer interaction
honeypot
Electronic mail
DarkComet malware
darkcomet
Compositionality
biblio
Analysis of DDoS-capable IoT malwares
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
botnets
Compositionality
Computer crime
IP networks
malware
Metrics
pubcrawl
Resiliency
taxonomy
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
biblio
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
IoT updates
update infrastructure
Software updates
Software
Smart homes
Roads
Resiliency
pubcrawl
prototype implementation
Peer-to-peer computing
Metrics
Logic gates
accountability
IoT
Internet of Things
internet
Innocuousness
computer network security
computer architecture
Compositionality
botnets
blockchain
Availability
biblio
Collaborative botnet detection with partial communication graph information
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Internet of Things
universal communication graph
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnets
partial information
partial communication graph information
P2P networks
P2P botnets
Metrics
machine learning techniques
invasive software
Internet-of-Things devices
Algorithm design and analysis
Image edge detection
graph theory
graph analysis
Error analysis
detection errors
detection algorithms
computer network security
Computer crime
Compositionality
community detection algorithms
collaborative botnet detection
centralized command & control structure botnets
botnets
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »