Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170101
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
"Towards dependable CPS infrastructures: Architectural and operating-system challenges"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
advanced persistent threat
computer architecture
CPS infrastructure
cyber-physical system
cyber-physical systems
Kernel
Linux
operating systems (computers)
operating-system level
pubcrawl170101
rudimentary solution
security
security of data
Virtual private networks
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 1:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
"Towards a science of anomaly detection system evasion"
Submitted by abfox on Tue, 02/14/2017 - 1:27pm
advanced persistent threat
anomaly detection system evasion
computer network security
Detectors
Entropy
estimation
evade detection
Grippers
Intrusion Detection
intrusion detection system
key based randomization scheme
launch evasion attack
parameter estimation
parameter estimation attacks
pubcrawl170101
biblio
"Security information sharing for the polish power system"
Submitted by abfox on Tue, 02/14/2017 - 1:24pm
multi-agent systems
Substations
substation
Stakeholders
security of data
SCADA systems
SCADA system
pubcrawl170101
power system security
power generation
power engineering computing
Polish power system
multiagent architecture
anonymity
information sharing security
information sharing
information security
information management
information exchange
information and communication technology
Electric Grid
distributed control system
distributed control
cybersecurity technology
cyberattack
Computer crime
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 1:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration
biblio
"A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
malware
zero-day exploit
wavelet transforms
wavelet transform
wavelet package analysis
wavelet analysis
static detection method
pubcrawl170101
Portable document format
persistent threat attacks
Compounds
malicious program
malicious document detection system
malicious document detection
malicious code
invasive software
infected compound document
feature extraction
entropy analysis componen
document handling
biblio
"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs"
Submitted by abfox on Tue, 02/14/2017 - 12:52pm
Data models
self-learning IDS
security of data
Safety
pubcrawl170101
Organizations
Intrusion Detection Systems
Intrusion Detection
ICT networks
economy vital backbone
advanced persistent threat
Cyber Attacks
customer network data
customer infrastructures
Complexity theory
BAESE system
APT
Analytical models
advanced persistent threats
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 12:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 12:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk
1
2
3
next ›
last »