Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network reconnaissance
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 10:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
Submitted by aekwall on Mon, 09/09/2019 - 10:49am
invasive software
tractable adversarial coupon-collector model
Steady-state
Servers
Scalability
Resiliency
reconnaissance activity
Reconnaissance
pubcrawl
Predictive Metrics
moving target defense
malware
Network reconnaissance
DDoS Attack
current session request intensity
computer network security
Computer crime
cloud proxied multiserver tenant
Cloud Computing
client request load
botnet reconnaissance
botnet
asynchronous moving-target defense
active reconnaissance
biblio
Preventing Collusion between SDN Defenders Anc Attackers Using a Game Theoretical Approach
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
preventing collusion
software defined networking
socio-rational approach
Silicon
SDN defenders
SDN controller
Resiliency
reputation system
repeated-game setting
Reconnaissance
pubcrawl
anti-collusion solution
Network reconnaissance
Games
game-theoretical solution concept
game theory
game theoretical approach
control systems
Conferences
computer network security
Computer crime
collusion attack
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
biblio
Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
machine-learned decision tree
variable clock skew
transport protocols
Training
TCP timestamps
Servers
Resiliency
pubcrawl
pattern classification
Network reconnaissance
network characteristics
Clocks
learning (artificial intelligence)
large-scale classification
IPv6-IPv4 siblings
IPv6 addresses
IPv4 addresses
IP networks
internet
Hardware
feature extraction
Decision trees
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
information gathering
Attack detection
attacker reconnaissance
authentication
critical server camouflaging
critical server infrastructures
CyberMoat
deception-based cyber defenses
decoy platform
decoy systems
decoy-enhanced defense framework
deployed decoys
dynamic proxy address shuffling
Fingerprint recognition
high-fidelity decoy servers
Virtual machining
Monitoring
Network reconnaissance
pubcrawl
Reconnaissance
Resiliency
defense mechanisms
security of data
Servers
service availability
static decoy configurations
targeted remote attacks
telecommunication security
transparent connection translation strategy
versatile front-end proxies
biblio
Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
surveillance result propagation
Aircraft
wireless communication interface
Unmanned Aerial Vehicles
UAV swarm
UAV network connectivity
temporarily invisible targets
target tracking optimization
target tracking
target detection
ant colony optimisation
surveillance mission
surveillance
stable overlay network
Resiliency
repulsive pheromones
object detection
reconnaissance mission
pubcrawl
pattern clustering
data sharing
Network reconnaissance
multihop clustering
multi-robot systems
map coverage performance
dual-pheromone clustering hybrid approach
dual-pheromone ant-colony model
DPCHA
disappearing target model
autonomous aircraft
autonomous aerial vehicles
coverage fairness
connection volatility
communication range
collaborative swarm
Clustering algorithms
cluster stability
Base stations
attractive pheromones
Atmospheric modeling
biblio
An Efficient Architecture for Modeling Path Loss on Forest Canopy Using LiDAR and Wireless Sensor Networks Fusion
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
Network reconnaissance
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »