Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reconnaissance
biblio
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
IoT Kill Chain
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Probabilistic logic
privacy
Predictive models
Object recognition
attack surface
Internet of Things
Cyber Kill Chain
Chained Attacks
botnets
botnet
Attacks on IoT Devices
Attack Structure
Metrics
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 12:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
Internet of battlefield things
security of data
security counter measure
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Monitoring
IoBT systems
IoBT control
iobt
Internet of Things
battlefield services
internet
information technology
Human Factors
Games
game theory
game theoretic modeling
cyberattack
cyber deception
Computational modeling
command and control systems
command and control
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »