Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
HTTP traffic
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings