Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ports (Computers)
biblio
Statesec: Stateful monitoring for DDoS protection in software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
Metrics
Statesec
stateful monitoring
Software Defined Networks
software defined networking
security threats
SDN
Resiliency
pubcrawl
process control
Ports (Computers)
network management
Monitoring
composability
IP networks
in-switch processing
Human behavior
entropy-based algorithm
distributed denial of service
DDoS protection
DDoS attack mitigation
DDoS attack detection
control systems
computer network security
Computer crime
biblio
Network parameters applicable in detection of infrastructure level DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network packets
Traffic flow
telecommunication traffic
resource availability
Resiliency
pubcrawl
Protocols
Ports (Computers)
network security
Anomaly Detection
Metrics
IP networks
Human behavior
Entropy
Electronic mail
DDoS attack detection
Computer crime
composability
biblio
SDN testbed for validation of cross-layer data-centric security policies
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
operational military systems
Software-Defined Networks
software-defined networking
software defined networking
Software
Servers
security policies
security
SDN security mechanisms
Resiliency
pubcrawl
principal component analysis
Ports (Computers)
Access Control
OpenFlow-based testbed
military computing
information security
Data Security
cross-layer data-centric security policies
Cross Layer Security
control systems
Containers
computer network security
computer centres
composability
Communication system security
biblio
Deployment and analysis of honeypots sensors as a paradigm to improve security on systems
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
security of data
sensor security
Sensor Systems
security breaches
safety gaps
Ports (Computers)
honeypots
honeypot sensors deployment
attacker
Servers
Metrics
Protocols
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Intrusion Detection
security
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Security policy transition framework for Software Defined networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
Software Defined Networks
software defined networking
Software
Security Policy Transitions
security policy transition framework
security policies
SDN environments
SDN
Ryuretic
RYU
pubcrawl
programming frameworks
Ports (Computers)
policy-based governance
Access Control
NOS
Network Security Policies
network operating system
network application development
Network Access Control
NAC
Monitoring
Kinetic theory
Government
Governance
external command
computer network security
collaboration
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
biblio
Anonymous port scanning: Performing network reconnaissance through Tor
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Network reconnaissance
Tor
scanning processes
scanning
scan rate
Resiliency
Reconnaissance
pubcrawl
Ports (Computers)
Nmap
Acceleration
Network interfaces
Management information systems
Linux
IP networks
internet
computer communications software
anonymous port scanning
anonymizing port scanning tools
anonymization
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »