Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat mitigation
biblio
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
insider threat
robust technique
Resiliency
resilience
remuneration
relational databases
relational database systems
relational database security
Relational Database
real time monitoring technique
pubcrawl
Predictive models
mitigating technique
Metrics
Knowledgebase
insiders accesses
threat mitigation
insider collusion threat prediction
information security
Human behavior
discovered collusion insider threat
database schema
database management systems
database architect
Data dependencies
Computer hacking
composability
Collusion Threat
collusion insider attacks
collaboration
Cloud Computing
authorisation
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
road safety
threat mitigation
metric
pubcrawl
Human behavior
Resiliency
traffic engineering computing
technological development
technical mitigation measures
Technical mitigation
security of data
Safety
road vehicles
automobiles
organizational mitigation measures
Organizational Mitigation
increased risks
cybersecurity threats
cyberattack
cyber threats
cyber threat mitigation
autonomous vehicles
automotive vehicle cybersecurity
automotive industry
Automotive engineering
biblio
Mitigating IoT Insecurity with Inoculation Epidemics
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
botnet
epidemic
Human behavior
inoculation
IoT
metric
pubcrawl
Resiliency
threat mitigation
botnets
biblio
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
Internal Threat
IoT
LLN
OF
Rank Attack Manipulation
RPL
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Knowledge-enriched Security and Privacy Threat Modeling
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
design
model enrichment
security
Threat Modeling
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Threat Intelligence Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
computing methodology
Intrusion Detection
threat hunting
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Hunting Observable Objects for Indication of Compromise
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
indicator of compromise
Intrusion Detection
threat intelligence
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Towards Poisoning of Deep Learning Algorithms with Back-Gradient Optimization
Submitted by grigby1 on Wed, 04/11/2018 - 2:47pm
pubcrawl
spam detection
Human behavior
Metrics
Scalability
adversarial examples
Adversarial Machine Learning
AI Poisoning
deep learning
resilience
Resiliency
threat mitigation
training data poisoning
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »