Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT
biblio
Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection
Submitted by grigby1 on Mon, 04/25/2022 - 3:23pm
IDS
zero days
telecommunication traffic
Support vector machines
security
Scalability
Resiliency
resilience
Recurrent neural networks
pubcrawl
Payload
Inspection
threat vectors
feature extraction
deep packet inspection
Data models
Cybersecurity
cyber
Big Data
autoencoder
APT
Anomaly Detection
AI
biblio
APT attack response system through AM-HIDS
Submitted by aekwall on Mon, 12/20/2021 - 12:23pm
Companies
White List
Personnel
NIST
malicious
Anti
AM-HIDS
APT
advanced persistent threat
security
malware
Human behavior
Resiliency
Metrics
pubcrawl
Computer crime
Scalability
real-time systems
biblio
Toward Pinpointing Data Leakage from Advanced Persistent Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
Human behavior
leakage auditing
fingerprint
Digital Forensics
data leakage
APT
advanced persistent threat
Forensics
Fingerprint recognition
Organizations
Resiliency
Metrics
pubcrawl
Databases
Conferences
Computer hacking
Scalability
Big Data
biblio
Unmasking Windows Advanced Persistent Threat Execution
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
dataset
statistical analysis
security
Scalability
sandboxing
pubcrawl
policy-based governance
Manuals
Industries
feature extraction
advanced persistent threat
data privacy
cyber security
Conferences
composability
collaboration agreements
collaboration
APT Execution
APT
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 2:39pm
synchronisation
PTP time synchronisation networks
PTP infrastructure components
PTP
programmable Man-in-the-Middle
programmable injector device
precision time protocol
IEEE 1588
computer clocks
advanced persistent threats
Clocks
Degradation
Synchronization
cyber-attacks
security of data
APT
advanced persistent threat
malware
delays
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Cyber-security
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
Internet of Things
threat vectors
software-defined networking
software defined networking
sequential decision making problems
SDN
Scalability
RL-based threat mitigation
resilience
Reinforcement learning
pubcrawl
neural fitted Q-learning agent
network security management
network behaviour
machine learning
learning (artificial intelligence)
threat mitigation
global network view
Decision Making
computer networks
computer network security
autonomous threat mitigation
autonomous network systems
ATMoS
APT
advanced persistent threat
ad-hoc solutions
active threat mitigation
Human behavior
Metrics
Resiliency
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
1
2
3
4
5
6
next ›
last »