Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reconnaissance
biblio
Markov Models of Cyber Kill Chains with Iterations
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Information systems
Weapons
targeted cyber-attack processes
targeted cyber attacks
stochastic models
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
Markov processes
Markov Models
Chained Attacks
homogeneous continuous time Markov chains
homogeneous continuous time Markov chain
cyber-attacks life cycles
cyber-attack process
cyber-attack life cycle
cyber-attack kill chains
cyber threats
cyber kill chains bases
cyber kill chain with iterations
command and control systems
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
biblio
Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
Submitted by grigby1 on Fri, 05/22/2020 - 1:19pm
optimized port scanning
tools
telecommunication traffic
Task Analysis
scanning perimeter
Resiliency
resilience
Reconnaissance
pubcrawl
port scanning
passive scanning
passive information gathering techniques
active reconnaissance phase
nmap tool
network traffic
network accountability
Monitoring
Metrics
Mathematics
internet
footprinting
computer network security
composability
Bandwidth
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 11:01am
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 11:00am
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 10:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Quantitative Analysis of Network Address Randomization's Security Effectiveness
Submitted by grigby1 on Fri, 05/15/2020 - 10:57am
quantitative analysis
statistical analysis
static network address
security effectiveness analysis
Scalability
Resiliency
resilience
Reconnaissance
randomization space
randomization frequency
random processes
quantitative security effectiveness analysis
Analytical models
pubcrawl
Network reconnaissance
Network Address Translation
network address randomization techniques
network address randomization
moving target defensee
general attacks
Fingerprint recognition
computer network security
Complexity theory
biblio
Measuring the Effectiveness of Network Deception
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
Network reconnaissance
uncertainty
target network
software-defined networking
software defined networking
SDN-based deception system
Scalability
Resiliency
resilience
reconnaissance surface
Reconnaissance
pubcrawl
network-based deception
network traffic
Bayes methods
Network Deception
measurement uncertainty
KL-divergence
IP networks
inference mechanisms
Government
cyber reconnaissance
cyber defensive system
cyber deception strategies
computer network security
Computer crime
belief system
Bayesian inference method
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
IPv6 DNS reconnaissance attacks
Servers
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
Network reconnaissance
naive brute forcing approach
IPv6 reconnaissance techniques
IPv6 network reconnaissance
brute force attacks
IPv6 addresses
IPv6
IPv4 address space
IP networks
internet
IDS
DNS Guard
DNS
computer network security
Computer crime
address scanning attacks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »