Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Wed, 05/06/2015 - 9:40am
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 9:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 9:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Analysis of a #x201c;/0 #x201d; Stealth Scan From a Botnet
Submitted by BrandonB on Wed, 05/06/2015 - 9:22am
animation
botnet
Communication system security
darknet
Geology
internet
Internet background radiation
Internet telephony
IP networks
network probing
Network Telescope
Ports (Computers)
scanning
Servers
Telescopes
VoIP
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:11am
internet
Topology
Sybil placement strategy statistical assessment
Stochastic processes
Stochastic Process
statistical analysis
Routing
peer-to-peer distributed hash tables
Peer-to-peer computing
packet level network simulation
network topology
invasive software
botnet command and control solution
interdefender coordination
diffused random graph
DHT-structured peer-to-peer botnets
DHT-structured P2P botnets
cyber security threat
Computers
computer network security
Computational modeling
compromised computer on-demand collections
command and control systems
C&C solutions
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
biblio
Multiagent Web for the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
language independent data formats
Web-scale multiagent Internet of Things
Web protocols
transport protocols
sensors
security
Protocols
network of networks
multiagent Web
multiagent architecture
multi-agent systems
Cloud Computing
JSON
Internet of Things
internet
HTTP
heterogeneous platforms
electronic data interchange
Databases
data management architecture
computer architecture
« first
‹ previous
…
84
85
86
87
88
89
90
91
92
…
next ›
last »