Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Identification of Ransomware families by Analyzing Network Traffic Using Machine Learning Techniques
Submitted by aekwall on Thu, 07/14/2022 - 4:20pm
Classification algorithms
composability
Computer hacking
feature extraction
machine learning
machine learning algorithms
Metrics
network traffic
Protocols
pubcrawl
Ransomware
ransomware attacks
ransomware families
Resiliency
telecommunication traffic
biblio
Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
Computer hacking
Servers
pubcrawl
Human behavior
Scalability
Protocols
bitcoin
botnet
information processing
command and control systems
bitcoin security
biblio
The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks
Submitted by grigby1 on Thu, 06/09/2022 - 2:51pm
Protocols
Python
MIMICs
Resiliency
smart devices
honey pots
honeypots
Human Factors
honeynet
Computer hacking
web services
Scalability
resilience
pubcrawl
Intrusion Detection Systems
Servers
security
biblio
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems
Submitted by grigby1 on Thu, 06/09/2022 - 2:51pm
tools
Computer hacking
security
pubcrawl
resilience
Conferences
performance evaluation
Scalability
industrial control
ICs
integrated circuits
Human Factors
honey pots
Resiliency
high-interaction
honeypot
biblio
Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity Threats
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
Nash Equilibrium
threat mitigation
MCTS
incomplete information games
extensive form games
counterfactual regret minimization
CFR
Sea measurements
codes
Minimization
Computer hacking
Monte Carlo methods
Metrics
Games
Resiliency
resilience
Human behavior
pubcrawl
Predictive models
biblio
A Novel System for Detecting and Preventing SQL Injection and Cross-Site-Script
Submitted by aekwall on Tue, 04/19/2022 - 11:27am
IP networks
Intrusion Detection
Protocols
Computer hacking
pubcrawl
Scalability
Resiliency
Human behavior
Firewalls (computing)
cross-site scripting
SQL injection
Cross Site Script
Intrusion Prevention System (IPS)
Network Intrusion Detection System (NIDS)
Reverse Proxy
Cross Site Scripting
biblio
Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation
Submitted by grigby1 on Wed, 04/13/2022 - 2:53pm
composability
DDoS Attack Prevention
IP address obfuscation
distributed denial of service
blockchains
identity authentication
denial-of-service attack
Internet of Things
Signal processing algorithms
Metrics
signal processing
Wireless communication
authentication
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Computer hacking
biblio
‘WLAN Security Protocols and WPA3 Security Approach Measurement Through Aircrack-ng Technique’
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
security
Protocols
Linux
Computer hacking
pubcrawl
Resiliency
wireless networks
Predictive Metrics
Atmospheric modeling
Aircrack-ng
Airodump-ng
Crack
Kali Linux
Standards organizations
Router Systems Security
biblio
Perceptual Image Hashing Using Surffor Feature Extraction and Ensemble Classifier
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
Metrics
surf features
Signal processing algorithms
signal processing
Safe Coding
Resistance
Resiliency
resilience
pubcrawl
Policy Based Governance
hash algorithms
Keyboards
image hashing
Image coding
Human Factors
Human behavior
feature extraction
Ensemble classifier
Computer hacking
biblio
A Study on Security Attacks in Wireless Sensor Network
Submitted by grigby1 on Tue, 03/01/2022 - 4:34pm
sensor security
Computer hacking
machine learning
Network Security Architecture
pubcrawl
resilience
Resiliency
security
security attacks
Task Analysis
Weather forecasting
Wireless communication
wireless sensor networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »