Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 12:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
Digital forensic framework using feedback and case history keeper
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Digital Forensics
system monitoring
pubcrawl170109
Mathematical model
history lookup facility
History
forensic models
feedback
Evidence
Adaptation models
digital forensic framework
digital crime investigation
digital crime
cyber crime investigation
Computers
Computer crime
Computational modeling
case history keeper
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
Extracting network connections from Windows 7 64-bit physical memory
Submitted by grigby1 on Tue, 03/07/2017 - 12:30pm
Network connections
word length 64 bit
Windows 7 physical memory
user interfaces
user credentials
resource management
remote addresses
Random access memory
RAM
pubcrawl170109
Ports (Computers)
port information
Pool Allocations
Physical Memory
network connections extraction
chats
messages
Memory Forensics
memory dump
local IP addresses
Live Forensics
kernel data structures
Forensics
Digital Forensics
data structures
cyber forensics investigation
cyber crime investigation
Conferences
Computers
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »