Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honey pots
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
Brain-Computer Interfaces in the Wild: Lessons Learned from a Large-Scale Deployment
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
BCI systems
honey pots
social configurations
public events
large-scale deployment
Honey pot (computing)
Headphones
group interactions
Computer interfaces
brain-computer interfaces
brain-computer interface system
behavioral patterns
Scalability
audience behavior
social sciences computing
behavioural sciences computing
Human Factors
sensors
pubcrawl
human computer interaction
Interviews
Resiliency
drones
biblio
Security of Medical Big Data Images using Decoy Technique
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
MRI reports
honey-pot
honeypot intrusion detection
Human Factors
Intrusion Detection
Medical Big Data
medical Big Data image security
medical image processing
Medical services
honey pots
pubcrawl
radiology
Resiliency
Scalability
security
security of data
teleradiology
X-rays
Databases
automation
Big Data
Biomedical imaging
biomedical MRI
biomedical telemetry
Cloud Computing
computerised tomography
CT scans
big data security
Decoy
decoy technique
diagnostic radiography
EHR security
electronic health records
health care
healthcare cloud
healthcare units
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Human behavior
virtual honeypot
uncommon attacks
strange vindictive attacks
Servers
Scalability
Resiliency
resilience
pubcrawl
Mitigation and hybrid algorithms
IP networks
intrusion prevention system
Interruption counteractive action framework
Internet Service Providers level
IDS
Human Factors
authority level system attacks
honeypot system
honey pots
Floods
expensive network resources
exceptional security risk
end-clients
distributed denial-of-service attack
digital attacks
detection
DDoS Attacks
DDoS Attack
computer network security
Computer crime
botnet
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
« first
‹ previous
1
2
3
4
5
6
next ›
last »