Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attackers
biblio
Disrupting Exploitable Patterns in Software to Make Systems Safer
Submitted by willirn1 on Tue, 10/26/2021 - 5:34pm
Toolchains
emergent execution engineers
emergent behaviors
attackers
Cyber Attacks
malicious actors
Software
C3E
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
Towards a Security Architecture for Protecting Connected Vehicles from Malware
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
Metrics
virtualisation
vehicle malware
vehicle ECUs
unexpected consequences
security architecture
security
Scalability
Resiliency
resilience
real-time operating system
pubcrawl
operating systems (computers)
operating systems
noncritical functionalities
mobile radio
attack surface
malware
life-threatening activities
invasive software
internet
infotainment system
control engineering computing
control critical vehicle functionalities
connected vehicles
connected vehicle software
computer architecture
automotive electronics
automobiles
automobile industry
attackers
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
Detection of Hurriedly Created Abnormal Profiles in Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
profile injection attacks
user-item rating matrix
user rating behavior
system ratings
synthetic coordinates
spurious profiles
specific ratings
specific items
security of data
Scalability
Resiliency
resilience
recommender systems
random ratings
Random Forest
pubcrawl
anomalous rating profiles
pattern clustering
Outliers
learning (artificial intelligence)
Labeling
k-means clustering
information filtering
hurriedly created abnormal profiles
Human Factors
Hidden Markov models
gaussian distribution
feature extraction
dimensionality reduction
clustering methods
attackers
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
security
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
Long short-term memory
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
compromised node
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
Anomaly Detection
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 10:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
DNS graph mining for malicious domain detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
multiple malicious domains
IP resolutions
labeled domains
malicious domain detection technique
malicious probabilities
Malware Analysis
malware detection
Markov processes
message passing
Metrics
IP networks
Nickel
potential malicious domains
privacy
probability
pubcrawl
resilience
Resiliency
variety cyber attacks
graph mining
belief propagation
belief propagation algorithm
computer network security
cyber security
Data mining
DNS data servers
DNS graph mining
Domain Resolution
Graph Interface
attackers
graph mining task
graph node
graph theory
graph-based interface
Human behavior
Inference algorithms
internet
invasive software
biblio
A generic request/reply based algorithm for detection of blackhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Mobile Ad Hoc Network technology
Vulnerability
telecommunication security
Technological innovation
security
RREP packet
Routing protocols
Robustness
Resiliency
resilience
RERR packet
pubcrawl
Monitoring
mobile ad hoc networks
Attack detection
Metrics
MANET nodes
MANET
malicious node
legitimate node
IP networks
generic request/reply
Compositionality
communication policy
collaboration
Blackhole attack
attacks
attackers
1
2
next ›
last »