Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
proactive defense
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 2:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model