Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Chained Attacks
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
Scalability
resilience
pubcrawl
Chained Attacks
black-box
web security
white-box
biblio
Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
pubcrawl
Scalability
resilience
Random walks
overlay network
hypercube
expander
DOS-attack
churn
Chained Attacks
biblio
The ASPIRE Framework for Software Protection
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
software protection tool chain
software metrics
Scalability
resilience
pubcrawl
man-at-the-end attacks
Decision support systems
compilers
Chained Attacks
Attack Modeling
annotations
biblio
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
Scalability
return-oriented programming
resilience
pubcrawl
hidden Markov model
Chained Attacks
attack code detection
biblio
An Automated Approach for Testing the Security of Web Applications Against Chained Attacks
Submitted by K_Hooper on Wed, 11/01/2017 - 11:03am
Chained Attacks
attack surface
Metrics
model-based testing
pubcrawl
resilience
Scalability
security
web applications
biblio
Tracking Data Flow at Gate-Level Through Structural Checking
Submitted by grigby1 on Fri, 10/27/2017 - 12:23pm
asset
Chained Attacks
composability
data flow tracking
Hardware Security
pubcrawl
Resiliency
structural checking
Trojan detection
trojan horse detection
biblio
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks
Submitted by grigby1 on Tue, 10/10/2017 - 10:52am
CFQ recovery
Chained Attacks
composability
emulation
Memory Forensics
Metrics
multi-path
pubcrawl
Resiliency
ROP
rop attacks
Scalability
biblio
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box
Submitted by grigby1 on Fri, 09/15/2017 - 11:01am
AES
Chained Attacks
Lightweight Ciphers
multi-party computation
polynomial masking
pubcrawl
Resiliency
secret sharing
Shuffling
side-channel analysis
biblio
A Framework for Threat Detection in Communication Systems
Submitted by grigby1 on Tue, 09/05/2017 - 1:19pm
advanced persistent threat
advanced persistent threats
Big Data
Chained Attacks
collaboration
composability
Human behavior
kill chain model
machine learning
Metrics
pattern matching
pubcrawl
Resiliency
Scalability
threat detection
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »