Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

attack actions

biblio

Visible to the public Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots

Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
  • resilience
  • IP networks
  • low interaction honeypots
  • low- interaction honeypot
  • low-interaction honeypot
  • operating systems
  • performance evaluation
  • Probes
  • pubcrawl
  • internet
  • Resiliency
  • Scalability
  • security
  • TCPIP
  • telecommunication security
  • tools
  • Windows - KFSensor
  • attack actions
  • inhibiting fingerprinting attacks
  • Human Factors
  • Human behavior
  • honey pots
  • fuzzy technique
  • fuzzy set theory
  • fingerprinting techniques
  • fingerprinting detection mechanism
  • fingerprinting attack tools
  • Fingerprint recognition
  • fingerprint low-interaction honeypots
  • data privacy
  • computer network security
  • completeness attack vectors
  • authorisation
biblio

Visible to the public Enhancement of probabilistic attack graphs for accurate cyber security monitoring

Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
  • security assessment
  • vulnerability scoring
  • probabilistic attack graphs
  • cyber security monitoring
  • computer security incidents
  • Bayesian methods
  • automatic countermeasure selection
  • attack response
  • attack probability
  • attack models
  • attack graph nodes
  • attack graph generation
  • attack actions
  • Computing Theory
  • security
  • security monitoring
  • Metrics
  • Indexes
  • Computational modeling
  • computer networks
  • Bayes methods
  • Monitoring
  • Software
  • security of data
  • attack graph
  • pubcrawl
  • graph theory
  • Security Metrics

Terms of Use  |  ©2023. CPS-VO