Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 2:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
Software
peripheral interfaces
plug and play functionality
powershell
pubcrawl
resilience
Resiliency
reverse shell
reverse shell backdoor
operating systems (computers)
spying attacks
Universal Serial Bus
USB attack
USB device
Webcam
Webcams
Windows Operating System Security
Keyboards
security
Arduino
backdoor reverse shell
composability
computer network security
exploitation
Hardware
invasive software
Windows operating system
malware
Metasploit Framework
Metrics
microcontrollers
microphone device
operating system
operating systems
biblio
Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:45pm
multiclass classification
transport protocols
Advanced Security Network Metrics & Tunneling Obfuscations dataset
anomaly-based intrusion detection system
anomaly-based Network intrusion detection systems
direct network intrusion
direct network intrusions
legitimate network traffic
legitimate TCP communications
network intrusion detection
multiclass classification baselines
multiclass classification NIDS
network intrusion detection system
obfuscated malicious TCP communications
obfuscated network intrusions
selected vulnerable network services
Signature-based Intrusion Detection System
learning (artificial intelligence)
Biological neural networks
Measurement
Neural networks
invasive software
pattern classification
computer science
composability
telecommunication traffic
Computational modeling
computer network security
Resiliency
resilience
Metrics
pubcrawl
feature extraction
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 1:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
slow HTTP attack
Metrics
network flow data
network management complexity
Ping flood attack
pubcrawl
resilience
Resiliency
Servers
IP networks
software defined networking
Software Defined Networks
TCP flags
TCP SYN flood attack
telecommunication control
telecommunication traffic
transport protocols
distributed denial of service attack
botnet
composability
Computer crime
computer network management
computer network security
DDoS attack detection
denial-of-service attack
distributed denial of service
DDoS attack mitigation
distributed source
Entropy
Floods
HTTP attacks
Human behavior
internet
invasive software
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
hidden cryptocurrency mining activities
security
Resiliency
resilience
pubcrawl
online front-ends
MiNo
Metrics
malware
malicious mining activities
invasive software
internet
Human behavior
Web Browser Security
Hidden Cryptocurrency Mining
digital currencies
Data mining
cryptojacking
cryptocurrency mining
cryptocurrencies
computer resources
Coinhive
Coin Mining
Chrome Web browser add-on application
cash money
bitcoin
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »