Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypot
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
biblio
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
certificate transparency
honeypot
Human behavior
human factor
Phishing
pubcrawl
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
biblio
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Micro-Honeypot
browser fingerprinting technique
conventional web honeypots
cybercrime traceability
fingerprint
Fingerprint recognition
Forensics
honeypot
IP networks
Browser Fingerprinting
stepping stones
track attackers
tracking
web attacker
Web attacks
Web Browser Security
Compositionality
Browsers
data privacy
security
pubcrawl
Human behavior
Metrics
Resiliency
Hardware
invasive software
internet
Web sites
computer network security
Servers
Cryptography
Computer crime
anonymous networks
attack information
biblio
Virtual Machine Introspection Based SSH Honeypot
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
High-level interaction
honey pots
honeypot
Human Factors
pubcrawl
resilience
Resiliency
Scalability
SSH
virtual machine introspection
« first
‹ previous
1
2
3
4
5
next ›
last »