Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
honey pots
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
biblio
Lord of Secure: The Virtual Reality Game for Educating Network Security
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
honey pots
Human behavior
Human Factors
pubcrawl
resilience
Resiliency
Scalability
biblio
Beyond Telnet: Prevalence of IoT Protocols in Telescope and Honeypot Measurements
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
honey pots
Human behavior
Human Factors
internet measurement
IoT
IoT attacks
IoT protocols
pubcrawl
resilience
Resiliency
Scalability
biblio
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
botnets
honey pots
Human Factors
Intrusion Detection
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
biblio
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
honey pots
Human Factors
pubcrawl
resilience
Resiliency
Scalability
biblio
Virtual Machine Introspection Based SSH Honeypot
Submitted by grigby1 on Mon, 11/19/2018 - 12:25pm
High-level interaction
honey pots
honeypot
Human Factors
pubcrawl
resilience
Resiliency
Scalability
SSH
virtual machine introspection
biblio
A First Look: Using Linux Containers for Deceptive Honeypots
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
deception
honey pots
honeypots
Human Factors
Linux containers
pubcrawl
resilience
Resiliency
Scalability
virtual machine
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
Servers
NS3 simulation
Probabilistic logic
pubcrawl
re-transition timeout mechanism
resilience
Resiliency
Routing protocols
Scalability
NS-3 Simulation
sigmoid filter optimization
TCP congestion control window algorithm
TCP packet size
telecommunication congestion control
telecommunication traffic
threshold bandwidth filter
transport protocols
attacker traffic
network efficiency
MATLAB
low-rate DoS attack detection
low-rate denial of service attack detection
low-rate bandwidth
Human Factors
honey-pot server
honey pots
high rate attacks
filtering theory
distributed DoS
denial of service (dos)
computer network security
Computer crime
Bandwidth
« first
‹ previous
1
2
3
4
5
6
next ›
last »