Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnet
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
internet
Web servers
Web request
web applications
Time-frequency Analysis
storage space
security of data
Resiliency
realtime attack response
pubcrawl
Protocols
Processing time
Metrics
IP networks
access frequency
immediate defense mechanism
Human behavior
hacker botnets
DDoS Web attack
DDoS attack mitigation
DDoS Detection and Mitigation
DDoS Attacks
DDoS attack detection
data structures
Computer crime
composability
botnet
attack packets
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
optimization
hyper-parameter optimization and realistic network traffic cyber dataset
hyper-parameter optimization tuning
Intrusion Detection
intrusion detection system
latest intrusion detection dataset
Metrics
network intrusion detection
neural nets
neural network algorithms
cyber-physical system traffic data
pubcrawl
realistic cyber dataset CSE-CIC-IDS2018
realistic cyber defense dataset
receiver operator characteristic
Resiliency
telecommunication traffic
tuning
web services
AWS
Human behavior
Amazon Web Services
area under ROC curve
Artificial Intelligence
artificial intelligence algorithms
artificial intelligence based network intrusion detection
artificial intelligence security
artificial intelligence technique
Artificial Neural Networks
Human Behavior and Cybersecurity
botnet
botnet attack detection
Canadian institute for cybersecurity
CIC
Cloud Computing
composability
computer network security
CSE-CIC-IDS2018
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »