Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Active Defense
biblio
Research on Edge Network Security Technology Based on DHR
Submitted by grigby1 on Wed, 07/12/2023 - 11:48am
edge computing
DHR
Active Defense
Multi-access Edge Computing
dynamic networks
Electrical Engineering
Redundancy
maintenance engineering
network security
security
composability
Computational modeling
Heuristic algorithms
Resiliency
resilience
Metrics
pubcrawl
biblio
A Direct Anonymous Attestation Scheme Based on Mimic Defense Mechanism
Submitted by grigby1 on Thu, 05/13/2021 - 1:08pm
machine-to-machine communications
Servers
Resiliency
resilience
Public key
pubcrawl
Protocols
privacy
mimic defense
Active Defense
M2M
Internet of Things
Human behavior
Hash functions
composability
attestation
anonymous attestation
biblio
A Security Situation Prediction Method Based on Improved Deep Belief Network
Submitted by aekwall on Tue, 04/27/2021 - 12:09pm
security
cyber-physical systems
Resiliency
pubcrawl
Sociology
Statistics
Prediction algorithms
Clustering algorithms
Communication networks
Predictive models
Deep Belief Network
belief networks
Active Defense
electricity information network
security situation prediction
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
AHEAD: A New Architecture for Active Defense
Submitted by grigby1 on Fri, 09/15/2017 - 9:58am
Active Defense
Automated Response Actions
cyber deception
honey pots
honeypot
honeytoken
Human behavior
intrusion detection system
pubcrawl
Resiliency
Scalability
biblio
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures
Submitted by BrandonB on Mon, 05/04/2015 - 1:18pm
government personnel
threat identification framework
security of data
proactive framework
private business
physical weapons
malicious actor
Law
internet
international norms
international constructs
internally based cyberthreat countermeasures
active cyberdefense
Government
Educational institutions
cyberweapons
Cyberspace
cyberdefenders
cyber domain
computer security
attribution agnostic cyberdefense constructs
attribution agnostic cyberdefense construct
anonymity protection
Active Defense