Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hacking techniques
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
"Ontology Based APT Attack Behavior Analysis in Cloud Computing"
Submitted by abfox on Tue, 02/14/2017 - 12:48pm
malicious attack behavior
zero-day vulnerability
security of data
pubcrawl170101
personal information
Organizations
ontology based APT attack behavior analysis
Ontology
ontologies (artificial intelligence)
Ontologies
malware
malicious code
advanced persistent threat
Intrusion Detection
Inference Rules
hacking techniques
economic damage
confidential information leakage
Computers
Communication system security
Cloud Computing
APT attack detection techniques
APT attack
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain