Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 12:14pm
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
biblio
"Case study on exploitation, detection and prevention of user account DoS through Advanced Persistent Threats"
Submitted by abfox on Tue, 02/14/2017 - 12:08pm
Protocols
XMPP bots
XMPP based botnet
usingastealthy attack mechanism
user account lockout features
user account DoS
system engineers
sophisticated attack
Servers
security analysts
pubcrawl170101
advanced persistent threat
Monitoring
ISO standards
Irrigation
invasive software
Electronic mail
denial of service
Databases
computer network security
APT
advanced persistent threats
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:05pm
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
biblio
"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"
Submitted by abfox on Tue, 02/14/2017 - 11:51am
advanced persistent threats
APT
computer network security
cost-benefit analysis
invasive software
Investment
malware
malware attacks
Mathematical model
Measurement
Organizations
pubcrawl170101
return on response investment
risk management
RORI index
security countermeasures
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting
biblio
A Lifecycle Based Approach for Malware Analysis
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
malicious outbound propagation
Zero day attack
spontaneous attack
specification-based detection
signature-based approach
Signature based
Reconnaissance
Polymorphic
peer coordination
network surveillance
Monitoring
Metamorphic
Malware Analysis
malware
anomaly based approach
local reconnaissance
lifecycle based approach
invasive software
inbound scan
inbound attack
hiding techniques
egg download
Educational institutions
device infection
Computers
client-side exploit
attack preparation
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 2:04pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 2:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
next ›
last »