Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security analysts
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems
Submitted by grigby1 on Wed, 11/04/2020 - 2:13pm
poisoning attacks prevention
Web sites
Twitter
threat intelligence systems
Support vector machines
social networking (online)
security of data
security analysts
Scalability
Resiliency
resilience
pubcrawl
AI Poisoning
online social media
malicious information
learning (artificial intelligence)
Human behavior
ensembled semi-supervised approach
Engines
cybersecurity domain
computer security
Artificial Intelligence
AI systems
biblio
"Case study on exploitation, detection and prevention of user account DoS through Advanced Persistent Threats"
Submitted by abfox on Tue, 02/14/2017 - 12:08pm
Protocols
XMPP bots
XMPP based botnet
usingastealthy attack mechanism
user account lockout features
user account DoS
system engineers
sophisticated attack
Servers
security analysts
pubcrawl170101
advanced persistent threat
Monitoring
ISO standards
Irrigation
invasive software
Electronic mail
denial of service
Databases
computer network security
APT
advanced persistent threats