Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeypot
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Fri, 09/15/2017 - 10:59am
honey pots
honeynet
honeypot
Human behavior
Intrusion Detection
intrusion prevention
network security.
pubcrawl
Resiliency
Scalability
biblio
AHEAD: A New Architecture for Active Defense
Submitted by grigby1 on Fri, 09/15/2017 - 10:58am
Active Defense
Automated Response Actions
cyber deception
honey pots
honeypot
honeytoken
Human behavior
intrusion detection system
pubcrawl
Resiliency
Scalability
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Tue, 08/22/2017 - 12:11pm
composability
honeynet
honeypot
Intrusion Detection
intrusion prevention
Metrics
network intrusion detection
network security.
pubcrawl
Resiliency
biblio
HoneyMix: Toward SDN-based Intelligent Honeynet
Submitted by grigby1 on Mon, 06/05/2017 - 12:49pm
honey pots
honeynet
honeypot
network function virtualization
pubcrawl
Resiliency
Scalability
SDN security
software-defined networking
biblio
Static and dynamic malware behavioral analysis based on arm based board
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
information system unauthorized use attempt detection
World Web application
static malware behavioral analysis
security
pubcrawl170114
network security
microprocessor chips
malicious activity detection
malicious activity analysis
invasive software
internet
ARM based board
honeypot engineering
honeypot
honeynet
HoneyD
Glasstopf
dynamic malware behavioral analysis
Dionaea
computer network security
CCFIS software
CCFIS sensor
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
The achieve of power manager application honey-pot based on sandbox
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
power manager application honey-pot
Sandboxing technology
sandbox
pubcrawl170114
power systems
power system simulation
power system security
power system management
power system
application layer simulation
power manager application
Power industry
Packaging
implementation
honeypot
Decision support systems
cyber-attack reduction
attack capture method
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 12:49pm
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
file
ACT2 Defense of Accounts Overview
Submitted by rzager on Fri, 09/16/2016 - 4:57pm. Contributors:
Art Friedman
Joel Rader
Danny Goff
Don French
Robert Zager
Overview of Defense of Accounts integrated defense
Science of Security
credentials
honeypot
spearphishing
Federated identity
two factor authentication
United States of America
Research Organization
Documentation
« first
‹ previous
1
2
3
4
5