Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 11:53am
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 11:51am
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
Run-Time Attack Detection in Cryptographic APIs
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
proof-of-concept log analysis tool
Wrapping
tools
standards
sensitive cryptographic keys
security of data
security API
run-time attack detection
Resiliency
resilience
pubcrawl
Proposals
APIs
PKCS\#11
Monitoring
key-management attacks
key security
financial infrastructures
Cryptography
cryptographic services
cryptographic API
critical infrastructures
Compositionality
application program interfaces
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 11:58am
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
biblio
P-Leader Multifractal Analysis for Text Type Identification
Submitted by grigby1 on Mon, 03/19/2018 - 12:38pm
p-leader multifractal formalism
wavelet transforms
wavelet analysis
tools
Time series analysis
text type identification
text analysis
stylometry
pubcrawl
p-leaders
corpus analysis
P-leader multifractal analysis
novels
Multifractal analysis
Metrics
literature
Human behavior
Fractals
estimation
biblio
Modeling User Communities for Identifying Security Risks in an Organization
Submitted by grigby1 on Mon, 03/05/2018 - 12:23pm
security of data
Peer-to-peer computing
Personnel
production environment
pubcrawl
resilience
Resiliency
Scalability
security
peer to peer security
security risks
team working
tools
UEBA
User and Entity Behavior Analytics
user communities
user feedback
Measurement
Companies
entity behavior analytics
feature-based weight assignments
Human behavior
Human Factors
insider threat
Louvain method
Louvain modularity
community detection
Metrics
network traffic
Niara's data
optimization
peer group creation
Peer grouping
peer grouping employees
biblio
Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
composability
Data mining
encryption
feature extraction
malware
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Robustness
tools
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
…
next ›
last »