Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnet
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
Mining Malware Command and Control Traces
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Human behavior
telecommunication traffic
security of data
Scalability
Resiliency
resilience
pubcrawl
Payloads
Pattern recognition
pattern classification
Metrics
malware threats
malware detection rates
malware
invasive software
advanced persistent threat
effective anomaly based detection technique
detecting botnets
Data mining
controller commands
control traces
control payloads
control channel
command and control systems
command and control
Classification algorithms
botnet
anomaly based detection
advanced persistent threats
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
biblio
Feature selection to detect botnets using machine learning algorithms
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
ISCX repositories
Training
testing
Servers
Resiliency
pubcrawl
Proposals
pattern classification
Metrics
malware detection
machine learning algorithms
machine learning
learning (artificial intelligence)
ISOT repositories
botnet
invasive software
genetic algorithms
genetic algorithm
Feature Selection
feature extraction
feature evaluation
Compositionality
command and control systems
command and control
C4.5 algorithm
C&c
botnets
Botnet detection
biblio
Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain
Submitted by grigby1 on Tue, 10/03/2017 - 11:47am
botnet
botnets
cyber security
HTTP automated software
Human behavior
malicious detection
Metrics
network security management
pubcrawl
Resiliency
Scalability
biblio
An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnet
botnets
Distributed Denial of Service (DDoS)
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
sFlow
Software-defined networking (SDN)
biblio
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnet
botnets
frequency domain
Human behavior
logs
Metrics
mining
proxy
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »