Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT
biblio
A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
Mobile handsets
Workstations
user plane
threat vectors
threat attributes
threat
Spear Phishing
security
pubcrawl
privacy
Phishing
Organizations
organizational user
organizational information systems
multiple APT threat vector scenarios
advanced persistent threat vectors
Metrics
malware prevention
malicious APT vector
invasive software
genuine communication
fraudulent communication
Email
Electronic mail
cyber-security defensive mechanisms
Computer crime
APT vulnerabilities
APT threat vector
APT decision matrix model
APT
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 10:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning
Submitted by grigby1 on Tue, 05/01/2018 - 11:36am
APT
Cyber Kill Chain
Human behavior
knowledge-based
pubcrawl
resilience
Resiliency
Scalability
supply chain security
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Meeting the Challenges of Critical and Extreme Dependability and Security
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion tolerance
ultra-resilient components
Telecommunications
sophisticated targeted attacks
Software
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Advanced and persistent threats
Hardware
fault and intrusion tolerance
extreme security risks
extreme computing
dependability risks
composability
APT
Algorithm design and analysis
advanced persistent threats
biblio
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
honeypots
underground market
UBA
Terminology
SIEM
security of data
security experts
security
sandboxing
pubcrawl
policy-based governance
Policy
Monitoring
Market research
life cycle phases
advanced persistent threat
highly skilled actors
Government
Governance
Electronic mail
delays
defence strategy
cyber-attacks
composability
compiled life cycle model
Biological system modeling
APT protection technologies
APT
advanced persistent threat attacks life cycle
biblio
Advance Persistent Threat: Botnet
Submitted by grigby1 on Tue, 09/05/2017 - 1:19pm
Human behavior
Zombie
zero access
spyware
Scalability
robot network
Resiliency
pubcrawl
P2P botnet
Metrics
Malware Analysis
malware
advanced persistent threat
cyber-attack
cyber mass attack
composability
collaboration
bots
botnets
botnet
automated attack
APT
advanced persistent threats
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs"
Submitted by abfox on Tue, 02/14/2017 - 1:52pm
Data models
self-learning IDS
security of data
Safety
pubcrawl170101
Organizations
Intrusion Detection Systems
Intrusion Detection
ICT networks
economy vital backbone
advanced persistent threat
Cyber Attacks
customer network data
customer infrastructures
Complexity theory
BAESE system
APT
Analytical models
advanced persistent threats
« first
‹ previous
1
2
3
4
5
6
next ›
last »