Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honeynet
biblio
Recommendation Method of Honeynet Trapping Component Based on LSTM
Submitted by grigby1 on Fri, 07/15/2022 - 11:59am
data privacy
Pervasive Computing Security
honeynet
Hacker's interests
attention mechanism
LSTM
Bridges
Metrics
network security
Big Data
Computer hacking
Scalability
Analytical models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Predictive models
biblio
The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks
Submitted by grigby1 on Thu, 06/09/2022 - 1:51pm
Protocols
Python
MIMICs
Resiliency
smart devices
honey pots
honeypots
Human Factors
honeynet
Computer hacking
web services
Scalability
resilience
pubcrawl
Intrusion Detection Systems
Servers
security
biblio
An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
network security
time 4 month
telecommunication network routing
signature-based attack analysis tools
Router Systems Security
Resiliency
resilience
pubcrawl
provider edge router honeynet system
Protocols
botnets
network protocol sniffer
Metrics
ISP edge router
IoT-based DDoS attack vectors
internet
honeynet
distributed denial of service attacks
DDoS Attacks
computer network security
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
An intelligent honeynet architecture based on software defined security
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
security
Metrics
pubcrawl
Resiliency
privacy
composability
Software
Hardware
computer architecture
energy consumption
honeynet
honeypot
network function virtualization
Packet loss
Software Defined Security
signal processing security
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Fri, 09/15/2017 - 9:59am
honey pots
honeynet
honeypot
Human behavior
Intrusion Detection
intrusion prevention
network security.
pubcrawl
Resiliency
Scalability
biblio
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Submitted by grigby1 on Tue, 08/22/2017 - 11:11am
composability
honeynet
honeypot
Intrusion Detection
intrusion prevention
Metrics
network intrusion detection
network security.
pubcrawl
Resiliency
biblio
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring
Submitted by grigby1 on Mon, 06/05/2017 - 11:49am
cyber threat intelligence
honeygrid
honeynet
marketplace
pubcrawl
Resiliency
Scalability
SDN
SDN security
threat mitigation
biblio
HoneyMix: Toward SDN-based Intelligent Honeynet
Submitted by grigby1 on Mon, 06/05/2017 - 11:49am
honey pots
honeynet
honeypot
network function virtualization
pubcrawl
Resiliency
Scalability
SDN security
software-defined networking
1
2
next ›
last »