Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 11:05am
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 1:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting
biblio
Verification of DNSsec Delegation Signatures
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
interactive theorem prover
Theorem Proving
Servers
security protocol verification
Public key
Protocols
model checking analysis
Isabelle/HOL
Isabelle-HOL
IP networks
internet
authentication
inference mechanisms
inductive approach
formal verification
DNSsec protocol
DNSsec delegation signatures
DNSsec
delegation signatures
Cryptographic Protocols
chain of trust
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
IP-based wireless sensor networks
WSNs
wireless sensor networks
wireless sensor key exchange protocol
Wireless communication
security
Protocols
lightweight key exchange protocol WSKE
IPSEC-6LoWPAN networks
IPsec
authentication
IP networks
Internet key exchange version 2 mechanism
internet
IKEv2
formal verification
end-to-end security
Cryptographic Protocols
Communication system security
AVISPA
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Trustworthiness Management in the Social Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
network traffic
trustworthiness management
Trusted Computing
social networks
social networking concepts
social networking (online)
Social network services
social IoT
Social Internet of Things
reliable system
Reliability
Peer-to-peer computing
P2P networks
Analytical models
network scalability
Internet of Things
internet
information/service discovery
General
feedback exchange
distributed systems
distributed hash table structure
Computer Systems Organization
Computational modeling
Communication/Networking and Information Technology
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics
« first
‹ previous
…
82
83
84
85
86
87
88
89
90
…
next ›
last »