Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malwares
biblio
Using advanced detection and prevention technique to mitigate threats in SDN architecture
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
SDN architecture
services deployment
SDN threats
OpenFlow KPG-MT
MITM
man in the middle attacks
malware-based attacks
KPG-MT
DoS/DDoS
distributed SDN
centralized network abstraction
DDoS Attack Prevention
centralized architecture
security devices
Denial of Service attacks
Software Defined Networks
Computer crime
malwares
SDN
authentication
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer architecture
invasive software
performance evaluation
malware
computer network security
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
An efficient modular security plane AM-SecP for hybrid distributed SDN
Submitted by grigby1 on Wed, 03/18/2020 - 10:58am
SDN layers which ease packets inspections
Internet service providers
invasive software
malwares
mobile operators
pubcrawl
resilience
Resiliency
Scalability
SDN
internet
SDN security
SDN's security issues
SDNs
security
security of data
Servers
software defined networking
technical challenges
telecommunication traffic
detecting intrusions
centralized network architecture
centralized security layer
computer architecture
Computer crime
computer network security
Conferences
control planes
data plane
denying services
AM-SecP
distributed systems
DoS/DDoS
efficient modular security plane AM-SecP
end user layer
Firewalls (computing)
flexibility
Forensics
hybrid distributed SDN
biblio
Static and Dynamic Malware Analysis Using Machine Learning
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
Internet oriented machines security
summary information
static malware analysis
static analysis
sandboxing
Resiliency
registry keys changed
pubcrawl
PEFILE
obfuscate
Metrics
malwares
malware
machine learning
learning (artificial intelligence)
invasive software
Malware Analysis
Human behavior
feature extraction
evade
Dynamic Malware Analysis
dynamic analysis
DLLs
Data mining
cuckoo sandbox
Classification algorithms
Binary
application program interfaces
APIs
privacy
Predictive Metrics
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement