Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
threshold limit
network load balancing
pubcrawl170109
resource allocation
reverse path forwarding
round-trip time
security problems
Servers
TCP throughputs
Load management
threshold limit defense
Throughput
transport protocols
UDP DDoS Attack
UDP DDoS cyber flood attack
Windows Server 2012
Windows Sever 2012
access control lists
Linux Ubuntu 13
Linux
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
cyber security
CPU utilization
computer network security
Computer crime
ACL
biblio
CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
CLaaS
Cloud Computing
cloud computing system
Computer crime
Cybersecurity
cybersecurity lab as a service
education
IP networks
pubcrawl170109
security of data
Servers
virtual cybersecurity
virtual lab
virtualisation
Virtualization
virtualization technology
biblio
A simulated criminal attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
a simulated criminal attack
advanced attack
branch office attack exercise
branch office attack plan
Computer crime
firewalls
head office attack exercise
head office attack plan
on-site reconnaissance
pubcrawl170109
Red Team exercise
remote information gathering
spear phishing exercise
spear phishing plan
threat analysis
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
Cyber-deception and attribution in capture-the-flag exercises
Submitted by grigby1 on Tue, 03/07/2017 - 1:35pm
DEFCON CTF exercise data
Training
Support vector machines
Social network services
security of data
pubcrawl170109
Payloads
pattern classification
Logistics
capture-the-flag exercises
DEFCON capture-the-flag exercise data
Decision trees
Cyber-security
cyber-deception
cyber-attack
culprit attribution
Computer crime
classification techniques
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »