Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud network
biblio
Enhanced DDOS Attack Detection Algorithm to Increase Network Lifetime in Cloud Environment
Submitted by grigby1 on Thu, 06/22/2023 - 1:28pm
cloud
science
cloud network
Algorithm
Attack detection
Resiliency
DDoS
DDoS attack detection
Hazards
denial-of-service attack
Cloud Computing
detection algorithms
Packet loss
composability
Protocols
Correlation
resilience
Metrics
Human behavior
pubcrawl
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
security
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
Long short-term memory
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
compromised node
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
Anomaly Detection
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology