Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security by Default
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 11:52am
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor
Submitted by grigby1 on Fri, 01/13/2023 - 11:52am
Ciphers
Training
pubcrawl
resilience
Resiliency
Filtering
Scalability
Linux
Buildings
Context
Security by Default
Costs
biblio
Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset
Submitted by grigby1 on Fri, 01/13/2023 - 11:51am
Shape
zero-day detection
smoothing
Gaussian NB
smoothing methods
Security by Default
NSL-KDD
network intrusion detection
gaussian distribution
Support vector machines
Intrusion Detection
Scalability
Analytical models
Radio frequency
Resiliency
resilience
pubcrawl
biblio
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
Submitted by grigby1 on Fri, 01/13/2023 - 11:51am
Cloud Computing
pubcrawl
resilience
Resiliency
Hardware
Scalability
privacy
Industries
Production
Virtual machine monitors
Security by Default
Epidemics
hypervisor security
secret-free
security-in-depth
speculative vulnerabilities
biblio
Behaviour Analysis of Open-Source Firewalls Under Security Crisis
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Flooding
Ping of death
pfSense
OPNSense
Open-source Firewalls
Nmap
Medusa
HYDRA
hping3
Firewall performance
Brute Force Attack
Security by Default
signal processing
Force
Firewalls (computing)
Virtual private networks
Floods
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
security
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 11:49am
Protocols
Port Security
DHCP Starvation
DHCP Snooping
DHCP Security
DHCP Flooding
dhcp
Security by Default
Integrated optics
Wireless communication
Organizations
Scalability
performance evaluation
network security
Resiliency
resilience
pubcrawl
IP networks
security
biblio
PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment
Submitted by grigby1 on Fri, 01/13/2023 - 11:49am
security
pubcrawl
resilience
Resiliency
Scalability
Protocols
Wireless communication
control systems
SDN
Firewalls (computing)
Security by Default
security threats
Behavioral sciences
P4 programming
Port knocking Security
Ports (Computers)
biblio
Default: Mutual Information-based Crash Triage for Massive Crashes
Submitted by grigby1 on Fri, 01/13/2023 - 11:49am
security
Neural networks
pubcrawl
resilience
Resiliency
Scalability
fuzzing
Computer bugs
Software algorithms
software security
Security by Default
Computer crashes
location awareness
Crash Triage
biblio
IronMask: Versatile Verification of Masking Security
Submitted by grigby1 on Fri, 01/13/2023 - 11:49am
Probes
standards
Silver
Side-channel security
Security by Default
security
Scalability
Resiliency
resilience
random probing model
pubcrawl
probing model
expandability
privacy
physical defaults
masking
lronMask
data structures
Composition
composability
complete verification
Benchmark testing
automatic verification
1
2
3
4
5
6
7
next ›
last »