Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber threat intelligence sharing
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 1:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
Submitted by grigby1 on Wed, 02/10/2021 - 12:13pm
Peer-to-peer computing
uses Quality
Threat intelligence sharing
reputation system
reputation estimation scheme
Open Cloud testbed
distributed trust
DefenseChain system
DefenseChain implementation
cyber threat intelligence sharing
cloud-hosted applications
blockchain platform
attack mitigation
Cryptography
Cyber Attacks
Attack detection
Cloud Computing
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Distributed databases
blockchain
cyber security
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 9:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency