Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious activities
biblio
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
security of data
Pervasive Computing Security
pubcrawl
resilience
Resiliency
security
security analytics
security events
security information and event management system
persists event data
security operator
security-related event logs
security-related events
SIEM
storage management
Storms
Throughput
tuning options
distribution frameworks
Big Data
Big Data challenge
composability
custom-built distribution solution
cyber-attacks
Distributed databases
distributed processing
distributed SIEM platform
Autonomic Security
event processing
in memory database
in-memory database
in-memory platform
malicious activities
normalization
persistence speed
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Moving target defense for adaptive adversaries
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
moving target defense
Unsolicited electronic mail
Training
Switches
standard static methods
security problems
security of data
security applications
security
reverse-engineer
reverse engineering
performance evaluation
adaptive adversaries
ML algorithms
malicious activities
machine learning
learning (artificial intelligence)
innocent activities
hybrid dynamical systems
Games
flexible MT defense strategy
cyber security
Biological system modeling
algorithm performance degradation
« first
‹ previous
1
2