Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics"
Submitted by abfox on Tue, 02/14/2017 - 1:25pm
digital forensic practitioner
Random access memory
pubcrawl170101
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 12:36pm
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
"Concept for a security investigation framework"
Submitted by abfox on Tue, 02/14/2017 - 12:29pm
malware
Trace Attacks
telecommunication security
standards
SIF
security systems
security investigation framework
Reliability
pubcrawl170101
Multi-Stage Attack
multi-stage APT
malware analyses
advanced persistent threat
log files
lateral movement
Investigation Framework
Forensics
forensic investigations
Correlation
Companies
APT campaigns
APT
advanced persistent threat campaigns
biblio
"Case study on exploitation, detection and prevention of user account DoS through Advanced Persistent Threats"
Submitted by abfox on Tue, 02/14/2017 - 12:08pm
Protocols
XMPP bots
XMPP based botnet
usingastealthy attack mechanism
user account lockout features
user account DoS
system engineers
sophisticated attack
Servers
security analysts
pubcrawl170101
advanced persistent threat
Monitoring
ISO standards
Irrigation
invasive software
Electronic mail
denial of service
Databases
computer network security
APT
advanced persistent threats
biblio
"Dynamic defense strategy against advanced persistent threat with insiders"
Submitted by abfox on Tue, 02/14/2017 - 12:01pm
game theory
two-layer game model
security of data
pubcrawl170101
Nash Equilibrium
malicious gain
Joints
information-trading game
Games
advanced persistent threat
dynamic defense strategy
defense/attack game
cyber security
Cost function
Computers
computer security
attack process
APT
biblio
"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"
Submitted by abfox on Tue, 02/14/2017 - 11:51am
advanced persistent threats
APT
computer network security
cost-benefit analysis
invasive software
Investment
malware
malware attacks
Mathematical model
Measurement
Organizations
pubcrawl170101
return on response investment
risk management
RORI index
security countermeasures
file
Improving Cybersecurity Through Human Systems Integration
Submitted by rzager on Mon, 08/08/2016 - 1:32pm. Contributors:
John Zager
Robert Zager
Science of Security
APT
cognitive dimension
Compliance Budget
computer network defense
cyberspace operations
habit
HSI
Human Systems Integration
information operations
military deception
negligent users
Phishing
spearphishing
usability
United States of America
Industry
White Paper
Cyber Attacks
Phishing
Cyber Security
Social Engineering
Usable Security
Spoofing
Social Engineering Attacks
Usability in Security and Privacy
« first
‹ previous
1
2
3
4
5
6
next ›
last »