Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
defense
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense
biblio
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Metrics
Zero-day attacks
zero-day attack related database
Zero Day Attacks and Defense
unknown zero-day attacks
traditional defense methods
signature based defense
security of data
Resiliency
relational databases
recurrent attack
pubcrawl
Predictive Metrics
online redundant heterogeneous functionally equivalent modules
Zero day attacks
Knowledge Discovery
Intrusion detection and response
honeypot
feedback
executive module pool
distributed computing
cyberspace mimic defense architecture
Cyberspace Mimic Defense
composability
CMD architecture
Anomaly statistics and analysis
defense
biblio
Time and Sequence Integrated Runtime Anomaly Detection for Embedded Systems
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Anomaly Detection
composability
defense
embedded system security
medical device security
Metrics
pubcrawl
Resiliency
software security
timing based detection
Zero day attacks
biblio
Detecting Phishing Websites Using Automation of Human Behavior
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Anti-phishing
automation
composability
defense
Heuristics
Metrics
Phishing
pubcrawl
Resiliency
selenium
Zero day attacks
biblio
How Discover a Malware Using Model Checking
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
composability
defense
formal methods
Metrics
mobile
pubcrawl
Resiliency
security
testing
Zero day attacks
biblio
SemFuzz: Semantics-Based Automatic Generation of Proof-of-Concept Exploits
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
composability
defense
exploit generation
fuzzing
Metrics
patch
pubcrawl
Resiliency
Semantics
Vulnerability
Zero day attacks
biblio
Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
adaptive cyber defense
bayesian attack graphs
composability
defense
Metrics
moving target defense
network security
online learning
POMDP
pubcrawl
Resiliency
Zero day attacks
biblio
Predicting Zero-Day Malicious IP Addresses
Submitted by grigby1 on Mon, 03/26/2018 - 1:12pm
sandboxing
composability
defense
malicious ip prediction
Metrics
pubcrawl
Resiliency
Zero day attacks
zero day malware prediction
biblio
DolphinAttack: Inaudible Voice Commands
Submitted by grigby1 on Tue, 02/27/2018 - 2:30pm
command injection attacks
composability
defense
mems microphones
Metrics
pubcrawl
resilience
Resiliency
Security analysis
Speech recognition
voice controllable systems
biblio
Hardware support for embedded operating system security
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
hardware monitor
attack
composability
Computer crime
Context
Data protection
defense
embedded operating system security
embedded OS security
Embedded System
embedded systems
field programmable gate arrays
FPGA prototype
FPGA-based prototype implementation
Hardware
hardware support
Hardware-based monitoring
Internet-connected embedded systems
Metrics
Monitoring
monitoring graph
operating system
operating systems (computers)
pubcrawl
Registers
remote hacking attacks
Resiliency
security
software-based protection mechanisms
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »