Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
Modeling the Operational Phases of APT Campaigns
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
APT
Tactics Techniques and Procedures
operational reading
operational phases
Knowledge engineering
final objectives achievement
cyberspace operations
cyber threat intelligence
Cyber Kill Chain
attack chronology
APT campaigns
advanced persistent threat attacks
APT attack
Context modeling
pubcrawl
advanced persistent threat
Metrics
Decision Making
NIST
Computational modeling
Data models
Scalability
Analytical models
computer network security
Resiliency
resilience
Human behavior
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
biblio
Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
advanced attacking skills
APT attack
threat intelligence sharing community
threat intelligence
Sharing Community
persistent attacking skills
low-quality shared intelligence
intelligence information
information processing
data sharing
cyber attack
analyzing malicious behavior
business data processing
cyber-attacks
APT
advanced persistent threat
Metrics
Computer crime
Scalability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 10:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
biblio
Detecting Adversary using Windows Digital Artifacts
Submitted by grigby1 on Fri, 04/17/2020 - 10:27am
microsoft windows
XTEC
Windows operating systems
Windows Operating System Security
Windows digital artifacts
third-party sensors
Task Analysis
Shimcache
sensors
security of data
Resiliency
resilience
pubcrawl
Prefetching
Microsoft Windows (operating systems)
advanced persistent threat
Metrics
malicious behaviors
machine learning
learning (artificial intelligence)
Incident Response
History
Forensics Investigation
file execution
estimation
composability
APT
application compatibility cache
adversary detection
biblio
The APT Detection Method Based on Attack Tree for SDN
Submitted by grigby1 on Fri, 06/28/2019 - 9:42am
APT
attack tree
Correlation analysis
pubcrawl
resilience
Resiliency
Scalability
SDN
SDN security
biblio
Information Protecting Against APT Based on the Study of Cyber Kill Chain with Weighted Bayesian Classification with Correction Factor
Submitted by grigby1 on Fri, 04/05/2019 - 9:29am
APT
Bayesian classification
Chained Attacks
correction factor
Cyber Kill Chain
pubcrawl
resilience
Resiliency
Scalability
TF-IDF
« first
‹ previous
1
2
3
4
5
6
next ›
last »