Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honey pots
biblio
Internet of Things Attack Group Identification Model Combined with Spectral Clustering
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
Human Factors
spectral clustering
attacker portrait
attack group
aggressive behavior
Resiliency
Image analysis
honey pots
Honey pot (computing)
Intrusion Detection
IoT security
Clustering algorithms
Benchmark testing
Data models
Scalability
Conferences
resilience
pubcrawl
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
A Comparative Survey on Blockchain Based Self Sovereign Identity System
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Medical services
smart contracts
self sovereign identity
Scalability
Resiliency
resilience
Public key
pubcrawl
privacy
Identity management
internet
Human Factors
Human behavior
honey pots
Honey Pot
Cryptography
blockchain
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
IoT networks
telnet honeypot detection
SSH Honeypots
security
Scalability
resource-constrained interconnected smart devices
Resiliency
pubcrawl
probability
probabilistic estimation
potential dynamic threats
network intrusion
attacks
intrusion-related threats
intrusion mission
intrusion
Internet of things environment
Internet of Things
Human Factors
honey pots
cyber security crimes
computer network security
Computer crime
attacks mitigation
biblio
A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
Protocols
learning (artificial intelligence)
machine learning
machine learning model
machine learning techniques
malware
malware detection
Metrics
network security
IoT security
pubcrawl
Resiliency
Scalability
Training
Zero-day attacks
Zero-Day DDoS Attack
zero-day DDoS attacks
Human Factors
Computer crime
computer network security
Data models
DDoS attack detection
detection framework
honey pots
honeypot-based approach
Human behavior
composability
Internet of Things
invasive software
IoT botnet DDoS attacks
IoT Botnets
IoT honeypot
IoT Honeypots
IoT malware
biblio
Dynamic Virtual Network Honeypot
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
Human Factors
honey pots
targeted system
system capacity
Dynamic virtual network honeypot
software-defined networking
honeypot system
network intrusion detection system
honeypot
computer network security
pubcrawl
Computer crime
Resiliency
software defined networking
virtualisation
Scalability
network function virtualization
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
« first
‹ previous
1
2
3
4
5
6
next ›
last »