Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

network security analysts

biblio

Visible to the public Behavioral analytics for inferring large-scale orchestrated probing events

Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
  • Internet traffic
  • telecommunication traffic
  • statistical techniques
  • statistical analysis
  • signal techniques
  • routable unallocated IP addresses
  • Probes
  • orchestration pattern
  • network security analysts
  • malware traffic
  • malware
  • malicious real darknet data
  • malicious activities
  • large-scale orchestrated probing events
  • IP networks
  • invasive software
  • computer network security
  • internet
  • information theory
  • information theoretical metrics
  • fuzzy set theory
  • fuzzy approaches
  • emergency response teams
  • early cyber attack warning
  • early cyber attack notification
  • data mining methods
  • Data mining
  • Cyberspace
  • cyber threat intelligence
  • cyber attack
  • coordination pattern
  • Conferences

Terms of Use  |  ©2023. CPS-VO