Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system monitoring
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:42pm
Metrics
Windows Operating System Security
universal system
the monitoring center
system monitoring
Servers
security of data
security information
Resiliency
resilience
received events
pubcrawl
Protocols
operating systems (computers)
operating systems
monitoring events
Windows operating system
Information systems
information security
Industrial engineering
event-forwarding technology
event sources
event management
event log analysis
event log
event forwarding technology
event collector
domain controller
computer security
composability
analysis of incidents
security
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Runtime Verification of Hyperproperties for Deterministic Programs
Submitted by grigby1 on Mon, 11/02/2020 - 11:39am
pubcrawl
system monitoring
software doping
Software
security policies
security of data
security
Scalability
safety hyperproperty
Safety
runtime verification problem
runtime verification monitors
runtime verification
Runtime
data minimality
program verification
parametric monitor
noninterference
Monitoring
information-flow policies
information-flow
i/o systems security
i-o systems security
finite element analysis
Doping
deterministic input-output programs
deterministic algorithms
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
intrusion detection system
system monitoring
System Identification
security of data
Scalability
Resiliency
resilience
pubcrawl
process-related attacks
process-based attacks
process-based anomaly detection
PN identification-based anomaly detection methods
Petri nets
Petri Net model identification
anomalous behaviour
industrial process
Industrial Control Systems
industrial control system
industrial control
improved industrial control system device logs processing method
ICS device
ICs
formalised method
expected behaviour
event-driven system analysis
event logs
cyber-attacks
Anomaly Detection
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
An Open Source Approach to Automating Surveillance and Compliance of Automatic Test Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:42pm
automatic test systems
Security Technical Implementation Guidelines
Quasar
Pulsar
OpenScap
open source strategy
open source Elastic Stack
open source data processing pipeline
open source approach
Nebula
HubbleStack components
HubbleStack
hardware abstraction layer software
fast file integrity manger
centralized infrastructure
automating surveillance
security of data
automatic test software
cyber
operating systems (computers)
ATE
application program interfaces
Automated Response Actions
public domain software
open source
internet
composability
pubcrawl
Resiliency
operating system
system monitoring
data integrity
biblio
SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
SDN security
log management
Metrics
network forensics
pubcrawl
resilience
Resiliency
Scalability
SDN forensics
log file identification
SDNLog-Foren
Secure log files
security enhancement
sensitive log data
software defined networking
Southbound interfaces
system monitoring
fine-grained access control
blockchain
Blockchain-based security
Computer crime
Computer hacking
computer network security
control systems
Cybersecurity
Digital Forensics
authorisation
global network configuration
Human behavior
Human Factors
information forensics
Integrity and Tamper Resistance.
log file analysis
log file collection
1
2
3
4
next ›
last »