Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Program-flow attestation of IoT systems software
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
malware
TrustZone
static attestation phase
static
software modification
security of data
security
Runtime
Resiliency
remote software-based attestation mechanisms
Remote Attestation
pubcrawl
programming
program-flow attestation
Program-Flow
Memory management
application program flow
IoT systems software
IoT
Internet of Things
impractical constraints
Human behavior
hardware devices
Hardware
dynamic attestation technique
dynamic
Dual Attestation
distributed processing
device integrity measurement
data integrity
composability
attestation
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 11:13am
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 11:13am
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
Disguised Executable Files in Spear-phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat
Submitted by grigby1 on Mon, 01/21/2019 - 11:36am
advanced persistent threat
advanced persistent threats
Cyber Attacks
disguised executable file
Human behavior
intrusion detection system
malware
Metrics
pubcrawl
Resiliency
Scalability
spear-phishing emails
biblio
Resolving Threats in IoT: ID Spoofing to DDoS
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
IP networks
Zigbee
unique identity
security of data
resource-constrained network
Resiliency
pubcrawl
PseudoRandom Identity Generator
Protocols
PRIG-adapted 6LoWPAN
personal area networks
personal area network model
Peer-to-peer computing
malware
malicious machines spoof ID
IP-enabled devices
6LoWPAN
IoT
invasive software
Internet-of-Things
Internet of Things
ID validation time
ID spoofing vulnerabilities
ID Spoofing
DDoS stress
DDoS
computer network security
Computer crime
composability
botnet
administrative machines
biblio
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
Metrics
zero-day intrusions
worldwide cybersecurity attacks
Windows Operating System Security
user files hostage
trees (mathematics)
suspicious ransomware behavior
strong trap layer
specific behavioral patterns
Servers
security of data
Resiliency
RansomWall tag
pubcrawl
operating systems (computers)
Microsoft Windows operating system
attacked OS
malware
machine learning algorithms
learning (artificial intelligence)
layered defense system
invasive software
initial layers
gradient tree boosting algorithm
Engines
encryption
detection rate
Cryptography
cryptographic ransomware families
cryptographic ransomware attacks
Computer crime
composability
biblio
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
unauthorized applications
Organizations
pubcrawl
Ransomware
ransomware execution prevention
Resiliency
SecureAPlus
Signature based
Trusted Computing
Microsoft Windows (operating systems)
virtual environment
VoodooShield
whitelisting
Windows edition
Windows Operating System Security
Windows OS
Windows Server edition
zero-day antimalware solution
composability
application control solutions
application whitelisting software
Application Whitelisting Solutions
AppLocker
authorisation
blacklisting
business data processing
CodeShield
administrative privileges
Cryptography
data breach prevention
Databases
enterprise environment
invasive software
malicious files
malware
Metrics
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »