Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network reconnaissance
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 1:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 12:01pm
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 12:00pm
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Indigenous Network Monitoring System
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
real-time systems
military communication
military reconnaissance
miniature preset codes
Monitoring
NavIC control center
Network reconnaissance
NMS
offline link analysis plot
Protocols
pubcrawl
real-time network monitoring
Lucknow
resilience
Resiliency
satellite navigation
Scalability
security
Simple Network Management Protocol
SMS alert
SMS alert and Security
snmp
SNMP comprise security risks
strategic necessity
GUI based real-time link status
command and control systems
communication link performance explication
computer network management
Decision Making
Electronic mail
electronic messaging
Email
external network satellite launch vehicle
Geo-orbit
graphical user interfaces
GUI
Bandwidth
ICMP
in-house network monitoring system
Inc
indigenous navigation system
indigenous Network monitoring system
inertial navigation
internet
Internet control message protocol based link monitoring
ISTRAC Launch network
ISTRAC network
link statistics
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Quantitative Analysis of Network Address Randomization's Security Effectiveness
Submitted by grigby1 on Fri, 05/15/2020 - 11:57am
quantitative analysis
statistical analysis
static network address
security effectiveness analysis
Scalability
Resiliency
resilience
Reconnaissance
randomization space
randomization frequency
random processes
quantitative security effectiveness analysis
Analytical models
pubcrawl
Network reconnaissance
Network Address Translation
network address randomization techniques
network address randomization
moving target defensee
general attacks
Fingerprint recognition
computer network security
Complexity theory
biblio
Detection of Spammers in the Reconnaissance Phase by machine learning techniques
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
pubcrawl
Xgboost
Twitter
testing
supervised learning
social networking (online)
Social Network Fake Profiles
security of data
Scalability
Resiliency
resilience
reconnaissance phase
artificial honeypot profiles
professional social networks
organizational social network
Network reconnaissance
machine learning techniques
machine learning algorithms
machine learning
learning (artificial intelligence)
Feature Based Strategy
DspamRPfast model
Conferences
Classification algorithms
biblio
Measuring the Effectiveness of Network Deception
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
Network reconnaissance
uncertainty
target network
software-defined networking
software defined networking
SDN-based deception system
Scalability
Resiliency
resilience
reconnaissance surface
Reconnaissance
pubcrawl
network-based deception
network traffic
Bayes methods
Network Deception
measurement uncertainty
KL-divergence
IP networks
inference mechanisms
Government
cyber reconnaissance
cyber defensive system
cyber deception strategies
computer network security
Computer crime
belief system
Bayesian inference method
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
IPv6 DNS reconnaissance attacks
Servers
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
Network reconnaissance
naive brute forcing approach
IPv6 reconnaissance techniques
IPv6 network reconnaissance
brute force attacks
IPv6 addresses
IPv6
IPv4 address space
IP networks
internet
IDS
DNS Guard
DNS
computer network security
Computer crime
address scanning attacks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »