Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170101
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
"Concept for a security investigation framework"
Submitted by abfox on Tue, 02/14/2017 - 12:29pm
malware
Trace Attacks
telecommunication security
standards
SIF
security systems
security investigation framework
Reliability
pubcrawl170101
Multi-Stage Attack
multi-stage APT
malware analyses
advanced persistent threat
log files
lateral movement
Investigation Framework
Forensics
forensic investigations
Correlation
Companies
APT campaigns
APT
advanced persistent threat campaigns
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 12:14pm
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
biblio
"Advanced Persistent Threats - detection and defense"
Submitted by abfox on Tue, 02/14/2017 - 12:11pm
Data protection
software IDS tools
Servers
security upgrades
security policies
pubcrawl170101
Organizations
Monitoring
malware
encryption
Access Control
Data mining
Cryptography
computer systems
command and control systems
authorisation
Attack vectors
Anomaly Detection
advanced persistent threats
biblio
"Case study on exploitation, detection and prevention of user account DoS through Advanced Persistent Threats"
Submitted by abfox on Tue, 02/14/2017 - 12:08pm
Protocols
XMPP bots
XMPP based botnet
usingastealthy attack mechanism
user account lockout features
user account DoS
system engineers
sophisticated attack
Servers
security analysts
pubcrawl170101
advanced persistent threat
Monitoring
ISO standards
Irrigation
invasive software
Electronic mail
denial of service
Databases
computer network security
APT
advanced persistent threats
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:05pm
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
biblio
"Dynamic defense strategy against advanced persistent threat with insiders"
Submitted by abfox on Tue, 02/14/2017 - 12:01pm
game theory
two-layer game model
security of data
pubcrawl170101
Nash Equilibrium
malicious gain
Joints
information-trading game
Games
advanced persistent threat
dynamic defense strategy
defense/attack game
cyber security
Cost function
Computers
computer security
attack process
APT
biblio
"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"
Submitted by abfox on Tue, 02/14/2017 - 11:51am
advanced persistent threats
APT
computer network security
cost-benefit analysis
invasive software
Investment
malware
malware attacks
Mathematical model
Measurement
Organizations
pubcrawl170101
return on response investment
risk management
RORI index
security countermeasures
biblio
"An efficient classification model for detecting advanced persistent threat"
Submitted by abfox on Tue, 02/14/2017 - 11:44am
Intrusion Detection
Vegetation
Training
targeted attack
pubcrawl170101
pattern classification
Organizations
model
Mathematical model
malware
intrusion prevention systems
advanced persistent threat
international trade
government agencies
firewalls
feature extraction
Cyber Attacks
classification model
APTs
antivirus solutions
advanced persistent threat detection
« first
‹ previous
1
2
3