Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT attack
biblio
Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat
Submitted by grigby1 on Fri, 08/07/2020 - 3:57pm
advanced attacking skills
APT attack
threat intelligence sharing community
threat intelligence
Sharing Community
persistent attacking skills
low-quality shared intelligence
intelligence information
information processing
data sharing
cyber attack
analyzing malicious behavior
business data processing
cyber-attacks
APT
advanced persistent threat
Metrics
Computer crime
Scalability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Ontology-Driven Security Requirements Recommendation for APT Attack
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Advanced Persistent Threat (APT)
system domain knowledge
security requirement
ontology-driven security requirements recommendation
ontology knowledge base
Ontology
knowledge base
general security knowledge ontology
domain-specific knowledge ontology
APT ontology
advanced persistent threat
recommender systems
cyber threats
Human Factors
APT attack
ontologies (artificial intelligence)
pubcrawl
Resiliency
Scalability
security of data
biblio
Ontology Modeling for APT Attack Detection in an IoT-based Power System
Submitted by aekwall on Mon, 06/24/2019 - 3:05pm
APT attack
Human behavior
IoT
Metrics
Ontology
policy-based governance
pubcrawl
Resiliency
Smart Grid
Smart Grid Consumeer Privacy
smart grid consumer privacy
biblio
A quantifiable Attack-Defense Trees model for APT attack
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
trees (mathematics)
probability
network attack
expert systems
Eigenvalues and eigenfunctions
attack-defense trees model
Attack-Defense Trees
APT attack
advanced persistent threat attacks
advanced persistent threats
security
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Buildings
Analytical models
security of data
analytic hierarchy process
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
"Ontology Based APT Attack Behavior Analysis in Cloud Computing"
Submitted by abfox on Tue, 02/14/2017 - 12:48pm
malicious attack behavior
zero-day vulnerability
security of data
pubcrawl170101
personal information
Organizations
ontology based APT attack behavior analysis
Ontology
ontologies (artificial intelligence)
Ontologies
malware
malicious code
advanced persistent threat
Intrusion Detection
Inference Rules
hacking techniques
economic damage
confidential information leakage
Computers
Communication system security
Cloud Computing
APT attack detection techniques
APT attack
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:05pm
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
« first
‹ previous
1
2