Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
Black-box scanners
Cross Site Scripting
cross-site scripting
Databases
Human behavior
Manuals
Payloads
pubcrawl
resilience
Resiliency
Scalability
SQL injection
stored SQLI
Stored XSS
Uniform resource locators
Web pages
biblio
Malicious Qr-Code Threats and Vulnerability of Blockchain
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
information security
XML
security
Scalability
Resiliency
resilience
QR-code attack
QR-Code
pubcrawl
Payloads
QR codes
Human behavior
Generators
fuzzing
Cyber-security
cross-site scripting
Cross Site Scripting
command injection attacks
blockchain
bitcoin
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification
Submitted by grigby1 on Thu, 01/28/2021 - 1:34pm
natural language processing
Traffic identification
telecommunication traffic
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
Payloads
android encryption
Metrics
Image coding
Human behavior
feature extraction
Encrypted traffic classification
dynamic word embedding
deep learning
Cryptography
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »