Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnet
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
DDoS Botnet Prevention Using Blockchain in Software Defined Internet of Things
Submitted by grigby1 on Wed, 12/18/2019 - 2:47pm
distributed blockchain
telecommunication security
software defined networking
software defined Internet of Things
SDN
Resiliency
resilience
pubcrawl
Metrics
invasive software
Internet of Things
Human behavior
Force
distributed denial of service attacks
botnets
defense perspectives
DDoS botnet prevention
DDoS Attack Prevention
DDoS
control center
computer network security
Computer crime
composability
botnet prevention system
botnet bondage
botnet
blockchain
bitcoin
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
biblio
Towards a Conversational Agent for Threat Detection in the Internet of Things
Submitted by aekwall on Mon, 12/16/2019 - 2:28pm
Internet of Things
Virtual Assistant
user speech
threat detection
telecommunication traffic
situational awareness
Scalability
pubcrawl
network traffic
network information
Metrics
invasive software
Intrusion Detection
conversational agents
Human behavior
DynamoDB Table
DDoS
conversational agent
conversation agents
consumer IoT networks
computer network security
Cloud Computing
botnet
anomalous traffic
Amazon Echo
Alexa
biblio
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
P2P bots
Spark
security
Scalability
Resiliency
resilience
pubcrawl
Periodicity Behavior Analysis
periodicity behavior
PeerGrep
Peer-to-peer computing
peer-to-peer botnets
peer to peer security
P2P hosts
P2P communications
botnet
P2P botnet
network security
Monitoring
Metrics
IP networks
IP addresses
invasive software
Human Factors
human factor
Human behavior
feature extraction
Conferences
computer network security
Botnet detection
biblio
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
Submitted by aekwall on Mon, 09/09/2019 - 10:49am
invasive software
tractable adversarial coupon-collector model
Steady-state
Servers
Scalability
Resiliency
reconnaissance activity
Reconnaissance
pubcrawl
Predictive Metrics
moving target defense
malware
Network reconnaissance
DDoS Attack
current session request intensity
computer network security
Computer crime
cloud proxied multiserver tenant
Cloud Computing
client request load
botnet reconnaissance
botnet
asynchronous moving-target defense
active reconnaissance
biblio
SysTaint: Assisting Reversing of Malicious Network Communications
Submitted by aekwall on Mon, 06/24/2019 - 2:40pm
botnet
communication protocol
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
software reverse engineering
Virtualization
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »