Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170114
biblio
Static and dynamic malware behavioral analysis based on arm based board
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
information system unauthorized use attempt detection
World Web application
static malware behavioral analysis
security
pubcrawl170114
network security
microprocessor chips
malicious activity detection
malicious activity analysis
invasive software
internet
ARM based board
honeypot engineering
honeypot
honeynet
HoneyD
Glasstopf
dynamic malware behavioral analysis
Dionaea
computer network security
CCFIS software
CCFIS sensor
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Challenges of Cloud Computing amp; Big Data Analytics
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
AaaS
Big Data
Big Data Analytics
Cloud Computing
data analysis
Distributed databases
File systems
Hadoop
HDFS
Honey Pot Nodes
manufacturing
Map Reduce
Organizations
pubcrawl170114
security
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data
biblio
The achieve of power manager application honey-pot based on sandbox
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
power manager application honey-pot
Sandboxing technology
sandbox
pubcrawl170114
power systems
power system simulation
power system security
power system management
power system
application layer simulation
power manager application
Power industry
Packaging
implementation
honeypot
Decision support systems
cyber-attack reduction
attack capture method