Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reconnaissance attack
biblio
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks
Submitted by grigby1 on Fri, 09/30/2022 - 7:44am
ICs
reconnaissance attack
iForest
Resiliency
ICS Anomaly Detection
deep neural networks
MLP
SCADA
integrated circuits
deep learning
industrial control
Scalability
resilience
pubcrawl
Intrusion Detection
Neural networks
Forestry
machine learning algorithms
biblio
Empirical Study on Reconnaissance Attacks in SDN-Aware Network for Evaluating Cyber Deception
Submitted by grigby1 on Tue, 03/01/2022 - 3:23pm
Penetration Testing
software-defined networking
SDN security
Scalability
Resiliency
resilience
reconnaissance attack
Reconnaissance
pubcrawl
Communications technology
network systems
Network reconnaissance
network architecture
Intrusion Detection
Distance measurement
cyber deception
Computer hacking
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 12:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model