Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack signatures
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach