Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kali Linux
biblio
Analysis of Cyber Security Attacks using Kali Linux
Submitted by grigby1 on Fri, 06/09/2023 - 1:13pm
Internet of Things
security
pubcrawl
resilience
Safety
Cybersecurity
Wireless communication
Linux
Phishing
Uniform resource locators
Kali Linux
cyber-attacks
COVID-19
Resiliency
Cybersecurity Damage Assessment
biblio
Web Application Penetration Testing & Patch Development Using Kali Linux
Submitted by grigby1 on Thu, 05/11/2023 - 4:49pm
Linux
SQLI
Spider
Skipfish
OS Command Injection
Resiliency
command injection attacks
XSS
Kali Linux
Python
flask
Servers
Manuals
Law
composability
Computer crime
internet
Safety
resilience
Metrics
pubcrawl
biblio
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Submitted by grigby1 on Fri, 03/03/2023 - 9:23am
Compositionality
Shodan Eye
Linux Operating System Security
Vulnerability Analysis
Kali Linux
Reconnaissance
Software algorithms
operating systems
resilience
Organizations
Linux
network security
composability
Industries
privacy
Resiliency
Metrics
pubcrawl
biblio
Exploit Security Vulnerabilities by Penetration Testing
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
DoS
White Box Test
Penetration Testing
Hashcat
dark web
Black Box Test
White Box Security
Kali Linux
Companies
DDoS
security
composability
Resiliency
Metrics
pubcrawl
information technology
Conferences
Computer hacking
computer networks
biblio
Evading Signature-Based Antivirus Software Using Custom Reverse Shell Exploit
Submitted by grigby1 on Tue, 04/19/2022 - 1:15pm
anti-virus
detection algorithms
Kali Linux
malware
Metasploit-Framework
Meterpreter
Msfvenom
Payloads
pubcrawl
resilience
Resiliency
reverse shell
Scalability
Servers
signature based defense
biblio
‘WLAN Security Protocols and WPA3 Security Approach Measurement Through Aircrack-ng Technique’
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
security
Protocols
Linux
Computer hacking
pubcrawl
Resiliency
wireless networks
Predictive Metrics
Atmospheric modeling
Aircrack-ng
Airodump-ng
Crack
Kali Linux
Standards organizations
Router Systems Security
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 4:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing