Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital Forensics
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
Digital forensic framework using feedback and case history keeper
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
Digital Forensics
system monitoring
pubcrawl170109
Mathematical model
history lookup facility
History
forensic models
feedback
Evidence
Adaptation models
digital forensic framework
digital crime investigation
digital crime
cyber crime investigation
Computers
Computer crime
Computational modeling
case history keeper
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
Extracting network connections from Windows 7 64-bit physical memory
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
Network connections
word length 64 bit
Windows 7 physical memory
user interfaces
user credentials
resource management
remote addresses
Random access memory
RAM
pubcrawl170109
Ports (Computers)
port information
Pool Allocations
Physical Memory
network connections extraction
chats
messages
Memory Forensics
memory dump
local IP addresses
Live Forensics
kernel data structures
Forensics
Digital Forensics
data structures
cyber forensics investigation
cyber crime investigation
Conferences
Computers
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
"Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics"
Submitted by abfox on Tue, 02/14/2017 - 1:25pm
digital forensic practitioner
Random access memory
pubcrawl170101
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Submitted by abfox on Tue, 02/14/2017 - 12:44pm
malware
virtual networks
pubcrawl170101
Protocols
Ports (Computers)
penetration and exploration phase
path control
OpenFlow technology
OpenFlow
network security
mission execution phase
malware responding system
malware detection system
malware communication
advanced persistent threat attacks
IP networks
invasive software
intrusion detection system
initial compromise phase
entry control measures
Dynamic Responding
Digital Forensics
Databases
computer security
computer network security
attacking infrastructure building phase
APT attacks
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:05pm
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
profile
Irfan Ahmed
Critical Manufacturing Sector
Energy Sector
Medical Devices
3-D Printing
Automotive
Networked Control
Secure Control Systems
Smart Grid
Resilient Systems
Science of Security
Education
Research Program Overview
and Cyber Physical Systems
Cybersecurity
Digital Forensics
lightweight virtualization
Virginia
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »