Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »