Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
PATIP-TREE: An Efficient Method to Look up the Network Address Attribution Information
Submitted by aekwall on Mon, 03/04/2019 - 10:45am
IP address attribution information lookup
attribution
traffic engineering
telecommunication network routing
real-time IP address attribution information lookup
Patricia Trie
PATIP-TREE
network traffic engineering
network traffic analysis system
network routing information
named data networking address
IPv6 address
IPv4 address
IP information lookup
human-in-the-loop security center paradigm
Internet Content Provider information
data structures
custom IP address attribution lookup
internet
Databases
Metrics
composability
pubcrawl
Human behavior
real-time systems
security
telecommunication traffic
IP networks
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Human behavior
virtual honeypot
uncommon attacks
strange vindictive attacks
Servers
Scalability
Resiliency
resilience
pubcrawl
Mitigation and hybrid algorithms
IP networks
intrusion prevention system
Interruption counteractive action framework
Internet Service Providers level
IDS
Human Factors
authority level system attacks
honeypot system
honey pots
Floods
expensive network resources
exceptional security risk
end-clients
distributed denial-of-service attack
digital attacks
detection
DDoS Attacks
DDoS Attack
computer network security
Computer crime
botnet
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »