Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
enterprise networks
biblio
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud
Submitted by aekwall on Fri, 04/01/2022 - 1:11pm
Task Analysis
Robustness
Big Data
deep learning
Scalability
machine learning
pubcrawl
Resiliency
denial-of-service attack
Reliability engineering
DDoS Attack
enterprise networks
software-defined networking
SDN security
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 11:44am
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 10:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
Cyber Scanning: A Comprehensive Survey
Submitted by BrandonB on Mon, 05/04/2015 - 1:40pm
Network reconnaissance
Cyber scanning
cyber scanning technique
Cyberspace
distributed cyber scanning detection method
enterprise networks
internet
Internet wide services
Monitoring
Protocols
Ports (Computers)
Probes
Probing
Probing campaigns
Scanning events
security of data
Servers
targeted cyber attack