Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
biblio
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
threshold limit
network load balancing
pubcrawl170109
resource allocation
reverse path forwarding
round-trip time
security problems
Servers
TCP throughputs
Load management
threshold limit defense
Throughput
transport protocols
UDP DDoS Attack
UDP DDoS cyber flood attack
Windows Server 2012
Windows Sever 2012
access control lists
Linux Ubuntu 13
Linux
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
cyber security
CPU utilization
computer network security
Computer crime
ACL
biblio
CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
CLaaS
Cloud Computing
cloud computing system
Computer crime
Cybersecurity
cybersecurity lab as a service
education
IP networks
pubcrawl170109
security of data
Servers
virtual cybersecurity
virtual lab
virtualisation
Virtualization
virtualization technology
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »