Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Honey Pot
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
A Comparative Survey on Blockchain Based Self Sovereign Identity System
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Medical services
smart contracts
self sovereign identity
Scalability
Resiliency
resilience
Public key
pubcrawl
privacy
Identity management
internet
Human Factors
Human behavior
honey pots
Honey Pot
Cryptography
blockchain
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data