Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion prevention
biblio
Agent-based ZeroLogon Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 12:49pm
Intrusion Detection
pubcrawl
Metrics
Resiliency
Human behavior
cyber-physical systems
Compositionality
Telecommunications
intrusion detection system
control systems
Agent
Critical Vulnerability
domain controller
intrusion prevention
vulnerability detection
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 11:57am
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 10:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl
biblio
CommunityGuard: A Crowdsourced Home Cyber-Security System
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
composability
crowdsourced security
DDoS Attack Prevention
Human behavior
intrusion prevention
IoT security
Metrics
pubcrawl
Resiliency
SDN security
trustworthiness
biblio
Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
intrusion prevention
Training
threat model
Threat Index
security threats
security of data
security issues
security
Resiliency
pubcrawl
Protocols
privacy
IoT-based CPS
IoT based CPHS
intrusion tolerance
Byzantine replication
Intrusion Detection
Internet of Things
Indexes
human participation
human involvement
human elements
holistic framework
cyber-physical systems
cyber-physical human systems
CPHS environment
composability
collaborative attacks
collaboration
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Fri, 09/15/2017 - 9:59am
honey pots
honeynet
honeypot
Human behavior
Intrusion Detection
intrusion prevention
network security.
pubcrawl
Resiliency
Scalability
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Tue, 08/22/2017 - 11:11am
composability
honeynet
honeypot
Intrusion Detection
intrusion prevention
Metrics
network intrusion detection
network security.
pubcrawl
Resiliency
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack