Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
botnet
biblio
Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm
Submitted by grigby1 on Tue, 09/19/2017 - 12:06pm
botnet
C&C server
cyber attack
DGA
DNS
Human behavior
Metrics
NetFlow
pubcrawl
Scalability
spam detection
biblio
Advance Persistent Threat: Botnet
Submitted by grigby1 on Tue, 09/05/2017 - 1:19pm
Human behavior
Zombie
zero access
spyware
Scalability
robot network
Resiliency
pubcrawl
P2P botnet
Metrics
Malware Analysis
malware
advanced persistent threat
cyber-attack
cyber mass attack
composability
collaboration
bots
botnets
botnet
automated attack
APT
advanced persistent threats
biblio
Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale Networks
Submitted by grigby1 on Fri, 05/19/2017 - 1:55pm
botnet
botnets
C&C server
Human behavior
Internet traffic
pubcrawl
traffic monitoring
biblio
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
Submitted by grigby1 on Mon, 03/20/2017 - 10:14am
botnet
coding theory
composability
Cyber-security
game theory
Metrics
probabilistic inference
Resiliency
security
biblio
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
Submitted by grigby1 on Fri, 03/17/2017 - 1:31pm
botnet
coding theory
composability
Cyber-security
game theory
Metrics
probabilistic inference
pubcrawl
Resiliency
security
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
file
Untangling Attribution
Submitted by Susan Landau on Fri, 06/19/2015 - 10:18am. Contributors:
David Clark
Susan Landau
attribution
MIT
privacy
WPI
DDoS
botnet
packet-layer
application-layer
identificatio
Presentations
Academia
Presentation
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »