Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

information gathering

biblio

Visible to the public BlackWidow: Monitoring the Dark Web for Cyber Security Information

Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
  • illegal services
  • web services
  • security analyst users
  • search engines
  • pubcrawl
  • open source intelligence
  • multiple dark Web
  • login information
  • learning (artificial intelligence)
  • knowledge graph
  • invasive software
  • interactive visual exploration
  • information gathering
  • information collection
  • BlackWidow
  • Human Factors
  • Human behavior
  • fraud
  • Docker-based microservice architecture
  • Dark Web services
  • Dark Web analysis
  • dark web
  • cybersecurity-related topics
  • cyber security intelligence purposes
  • cyber security information
  • cyber security domain
  • cyber intelligence
  • cyber criminals
biblio

Visible to the public CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms

Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
  • information gathering
  • Attack detection
  • attacker reconnaissance
  • authentication
  • critical server camouflaging
  • critical server infrastructures
  • CyberMoat
  • deception-based cyber defenses
  • decoy platform
  • decoy systems
  • decoy-enhanced defense framework
  • deployed decoys
  • dynamic proxy address shuffling
  • Fingerprint recognition
  • high-fidelity decoy servers
  • Virtual machining
  • Monitoring
  • Network reconnaissance
  • pubcrawl
  • Reconnaissance
  • Resiliency
  • defense mechanisms
  • security of data
  • Servers
  • service availability
  • static decoy configurations
  • targeted remote attacks
  • telecommunication security
  • transparent connection translation strategy
  • versatile front-end proxies

Terms of Use  |  ©2023. CPS-VO