Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypot
biblio
Attacks Landscape in the Dark Side of the Web
Submitted by grigby1 on Wed, 09/12/2018 - 11:16am
dark web
honey pots
honeypot
Human behavior
Human Factors
pubcrawl
web security
biblio
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Metrics
Zero-day attacks
zero-day attack related database
Zero Day Attacks and Defense
unknown zero-day attacks
traditional defense methods
signature based defense
security of data
Resiliency
relational databases
recurrent attack
pubcrawl
Predictive Metrics
online redundant heterogeneous functionally equivalent modules
Zero day attacks
Knowledge Discovery
Intrusion detection and response
honeypot
feedback
executive module pool
distributed computing
cyberspace mimic defense architecture
Cyberspace Mimic Defense
composability
CMD architecture
Anomaly statistics and analysis
defense
biblio
Fending off IoT-hunting Attacks at Home Networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
home network
honey pots
honeypot
IoT
Metrics
moving target defense
pubcrawl
Resiliency
Router Systems
security
biblio
Prevention of DDoS attacks in cloud environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
endowment technological data
utility computing
touchy data
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
honeypot
Handheld computers
gigantic curiosity
Big Data
distributed denial of service
distributed computing
DDoS Defence procedures
DDoS Attack Prevention
DDoS Attack
computer network security
computational intelligence
computational assets
composability
collaboration
cloud services
cloud environment
Cloud Computing
biblio
An intelligent honeynet architecture based on software defined security
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
security
Metrics
pubcrawl
Resiliency
privacy
composability
Software
Hardware
computer architecture
energy consumption
honeynet
honeypot
network function virtualization
Packet loss
Software Defined Security
signal processing security
biblio
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Monitoring
Webcams
Trojan horses
tools
Resiliency
remote attackers interactive control
remote access trojans
remote access trojan
Rats
RAT malware
RAT
pubcrawl
botnets
Metrics
invasive software
interactive systems
human operator interaction
human computer interaction
honeypot
Electronic mail
DarkComet malware
darkcomet
Compositionality
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
biblio
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems
Submitted by grigby1 on Thu, 10/19/2017 - 11:05am
Compositionality
honeypot
Human behavior
industrial control systems (ICS)
programmable logic controller (PLC)
pubcrawl
Resiliency
SCADA
SCADA Systems Security
biblio
Leveraging Time for Spammers Detection on Twitter
Submitted by grigby1 on Tue, 09/19/2017 - 12:06pm
honeypot
Human behavior
legitimate users
machine learning
Metrics
pubcrawl
Scalability
spam
spam detection
Time
« first
‹ previous
1
2
3
4
5
next ›
last »