Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypots
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
online trained supervised classification schemes
zero-day threats learning
zero-day threat detection
Zero-day attacks
Zero day attacks
Training
Support vector machines
stream processing technology
security systems
security of data
security
Resiliency
resilience
real-time systems
pubcrawl
online trained unsupervised anomaly detection schemes
Adaptation models
network operator
Metrics
legitimate user behavior
learning (artificial intelligence)
honeypots
Distributed databases
detection models training
defense
composability
attacker behavior
Anomaly Detection
adaptive threat detection architecture
adaptive real-time architecture
adaptive detection schemes
biblio
A First Look: Using Linux Containers for Deceptive Honeypots
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
deception
honey pots
honeypots
Human Factors
Linux containers
pubcrawl
resilience
Resiliency
Scalability
virtual machine
biblio
Deployment and analysis of honeypots sensors as a paradigm to improve security on systems
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
security of data
sensor security
Sensor Systems
security breaches
safety gaps
Ports (Computers)
honeypots
honeypot sensors deployment
attacker
Servers
Metrics
Protocols
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Intrusion Detection
security
biblio
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
honeypots
underground market
UBA
Terminology
SIEM
security of data
security experts
security
sandboxing
pubcrawl
policy-based governance
Policy
Monitoring
Market research
life cycle phases
advanced persistent threat
highly skilled actors
Government
Governance
Electronic mail
delays
defence strategy
cyber-attacks
composability
compiled life cycle model
Biological system modeling
APT protection technologies
APT
advanced persistent threat attacks life cycle
biblio
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks
Submitted by grigby1 on Fri, 09/15/2017 - 10:59am
amplification denial-of-service
attribution
honey pots
honeypots
Human behavior
network scanner
pubcrawl
Resiliency
Scalability
selective response
biblio
An Interface Diversified Honeypot for Malware Analysis
Submitted by grigby1 on Fri, 09/15/2017 - 10:59am
diversification
honey pots
honeypots
Human behavior
Intrusion Detection
pubcrawl
Resiliency
Scalability
security
biblio
Towards High-Interaction Virtual ICS Honeypots-in-a-Box
Submitted by grigby1 on Tue, 09/05/2017 - 1:25pm
composability
CPS modeling
cyber-physical systems
honeypots
Industrial Control Systems
Metrics
pubcrawl
Resiliency
se- curity
simulation
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
« first
‹ previous
1
2
3
next ›
last »