Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypots
biblio
Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security
Submitted by grigby1 on Mon, 02/13/2023 - 1:58pm
IoT security
computer networks
honeypots
iiot
Industrial Internet of Things
Intelligent sensors
IoT
network measurements
network security
pubcrawl
Scalability
Scalable Security
security
Threat Intelligence Sensor
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 11:52am
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
Submitted by grigby1 on Thu, 06/09/2022 - 1:53pm
traffic control
ssh-attacks
cyber-threat intelligence
Resiliency
Cowrie
honey pots
honeypots
Malicious Traffic
Human Factors
botnet
Monitoring
password
Object recognition
internet
Scalability
resilience
pubcrawl
IP networks
Servers
biblio
The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks
Submitted by grigby1 on Thu, 06/09/2022 - 1:51pm
Protocols
Python
MIMICs
Resiliency
smart devices
honey pots
honeypots
Human Factors
honeynet
Computer hacking
web services
Scalability
resilience
pubcrawl
Intrusion Detection Systems
Servers
security
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Submitted by grigby1 on Fri, 05/15/2020 - 10:35am
optimized configuration
threat model presumes
subnets
Statistics
Software Defined Networks
software defined networking
Software Defined Network
Software
Sociology
Scalability
Resiliency
resilience
reconnaissance scans
Reconnaissance
pubcrawl
Artificial Intelligence
NMAP ping scans
Network reconnaissance
Network Deception
IP networks
IP addresses
honeypots
high performing static defenses
genetic algorithms
Generators
evading detection
deceptive network view
computer network security
coevolutionary genetic algorithm
coevolution
biblio
Cross-Stack Threat Sensing for Cyber Security and Resilience
Submitted by grigby1 on Mon, 08/26/2019 - 10:10am
Intrusion Detection
Weapons
tactical deception capabilities
Software
Servers
sensors
security of data
security
Routing
Resiliency
resilience
pubcrawl
Production
national interest networks
cyber security
honeypots
equipping applications
deceptive attack-response capabilities
deception
cyber-threat data
active mitigation capabilities
composability
Cross Layer Security
cross-stack sensor framework
cross-stack threat sensing
Cyber Operations
cyber resilience
biblio
Deploying South African Social Honeypots on Twitter
Submitted by grigby1 on Mon, 02/25/2019 - 2:19pm
pubcrawl
Human behavior
Scalability
Human Factors
honeypots
social media
Social Agents
automated social agent detection
1
2
3
next ›
last »