Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnets
biblio
A Moving Target Defense Approach to Disrupting Stealthy Botnets
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnets
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
biblio
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnet
botnets
frequency domain
Human behavior
logs
Metrics
mining
proxy
pubcrawl
Resiliency
Scalability
biblio
A Method for Detecting DGA Botnet Based on Semantic and Cluster Analysis
Submitted by grigby1 on Tue, 09/19/2017 - 12:06pm
bigram
botnets
DGA botnet
DGA botnet detection
Human behavior
Mahalanobis distance
Metrics
NXDomain
pubcrawl
Scalability
spam detection
biblio
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Submitted by grigby1 on Fri, 09/15/2017 - 10:44am
botnets
composability
Compositionality
computational intelligence
Cryptography
cyber threat intelligence
IOC
natural language processing
pubcrawl
threat mitigation
biblio
Advance Persistent Threat: Botnet
Submitted by grigby1 on Tue, 09/05/2017 - 1:19pm
Human behavior
Zombie
zero access
spyware
Scalability
robot network
Resiliency
pubcrawl
P2P botnet
Metrics
Malware Analysis
malware
advanced persistent threat
cyber-attack
cyber mass attack
composability
collaboration
bots
botnets
botnet
automated attack
APT
advanced persistent threats
biblio
A Moving Target Defense Approach to Disrupting Stealthy Botnets
Submitted by grigby1 on Tue, 06/27/2017 - 1:43pm
botnets
detector placement
Metrics
moving target defense
moving target defenses
pubcrawl
resilience
Scalability
biblio
Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale Networks
Submitted by grigby1 on Fri, 05/19/2017 - 1:55pm
botnet
botnets
C&C server
Human behavior
Internet traffic
pubcrawl
traffic monitoring
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 2:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 10:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »