Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reconnaissance
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Resiliency
virtual ports
virtual port numbers
virtual IPs
virtual IP addresses
Synchronization
Static Network
Software-Defined Networks
software-defined networking-based MTD technique
software defined networking
Servers
scanning attacks
Scalability
RHSM
attack success probability
resilience
Reconnaissance
random IP addresses
random host and service multiplexing technique
pubcrawl
proactive defense mechanism
Network reconnaissance
Multiplexing
MTD technique
IP networks
control systems
computer network security
biblio
Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Submitted by grigby1 on Fri, 05/15/2020 - 10:35am
optimized configuration
threat model presumes
subnets
Statistics
Software Defined Networks
software defined networking
Software Defined Network
Software
Sociology
Scalability
Resiliency
resilience
reconnaissance scans
Reconnaissance
pubcrawl
Artificial Intelligence
NMAP ping scans
Network reconnaissance
Network Deception
IP networks
IP addresses
honeypots
high performing static defenses
genetic algorithms
Generators
evading detection
deceptive network view
computer network security
coevolutionary genetic algorithm
coevolution
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 3:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 11:39am
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
Submitted by aekwall on Mon, 09/09/2019 - 9:49am
invasive software
tractable adversarial coupon-collector model
Steady-state
Servers
Scalability
Resiliency
reconnaissance activity
Reconnaissance
pubcrawl
Predictive Metrics
moving target defense
malware
Network reconnaissance
DDoS Attack
current session request intensity
computer network security
Computer crime
cloud proxied multiserver tenant
Cloud Computing
client request load
botnet reconnaissance
botnet
asynchronous moving-target defense
active reconnaissance
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 11:36am
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »