Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypot
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 11:36am
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
Analysis and Modelling of Multi-Stage Attacks
Submitted by grigby1 on Tue, 09/21/2021 - 2:52pm
machine learning
tools
security
Resiliency
resilience
pubcrawl
privacy
multi-stage attacks
Metrics
Malware Analysis
Analytical models
Labeling
Human behavior
honeypot
graph theory
Engines
cyberattack
Computational modeling
Attack modelling
biblio
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping
Submitted by grigby1 on Thu, 03/18/2021 - 1:35pm
image segmentation
Web sites
Web Bots
web applications
user-friendliness
text-based CAPTCHA challenge
text analysis
segmentation technique
security of data
security mechanism
pubcrawl
optical character recognition
Multilingual CAPTCHA
internet
CAPTCHA string
Human Interaction Proof
human computer interaction
Human behavior
honeypot technique
honeypot
Hip
hidden text-boxes
deformations
Data protection
composability
captchas
CAPTCHA Usability
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 1:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
biblio
Hybrid System to Minimize Damage by Zero-Day Attack based on NIDPS and HoneyPot
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
composability
convergence
cyber attack
defense
honeypot
information and communication technology
Metrics
network security
NIDPS
pubcrawl
real-time systems
resilience
Resiliency
Zero day attacks
zero-day
biblio
Website and Network Security Techniques against Brute Force Attacks using Honeypot
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
pubcrawl
web security
Human Factors
policy-based governance
network security
Brute force
honeypot
Medusa
brute force attacks
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
Dynamic Virtual Network Honeypot
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
Human Factors
honey pots
targeted system
system capacity
Dynamic virtual network honeypot
software-defined networking
honeypot system
network intrusion detection system
honeypot
computer network security
pubcrawl
Computer crime
Resiliency
software defined networking
virtualisation
Scalability
network function virtualization
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
« first
‹ previous
1
2
3
4
5
next ›
last »