Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacker behavior
biblio
Research on Attack Mechanism using Attack Surface
Submitted by aekwall on Thu, 05/13/2021 - 11:35am
computer architecture
Resiliency
pubcrawl
Metrics
Indexes
Scalability
Systems architecture
Permission
Power supplies
attack surface
attacker behavior
IEEE Sections
mimic defense
Quantitative Security
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
online trained supervised classification schemes
zero-day threats learning
zero-day threat detection
Zero-day attacks
Zero day attacks
Training
Support vector machines
stream processing technology
security systems
security of data
security
Resiliency
resilience
real-time systems
pubcrawl
online trained unsupervised anomaly detection schemes
Adaptation models
network operator
Metrics
legitimate user behavior
learning (artificial intelligence)
honeypots
Distributed databases
detection models training
defense
composability
attacker behavior
Anomaly Detection
adaptive threat detection architecture
adaptive real-time architecture
adaptive detection schemes
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA