Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Determining proximal geolocation of IoT edge devices via covert channel
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
IoT edge devices
trusted router
tools
telecommunication channels
smart meters
Scalability
Routing protocols
roadside speed sensors
Resiliency
radiation sensors
pubcrawl
Protocols
pressure sensors
IP packets
IP networks
chemical sensors
Internet Protocol
Internet packet router authentication
Internet of Things
internet
Intelligent sensors
Geology
geolocation techniques
geolocation authentication
geolocation
covert channels
covert channel
computer network security
Compositionality
command and control center
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
Analysis of DDoS-capable IoT malwares
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
botnets
Compositionality
Computer crime
IP networks
malware
Metrics
pubcrawl
Resiliency
taxonomy
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
biblio
PeerHunter: Detecting peer-to-peer botnets through community behavior analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
mutual contacts
Resiliency
pubcrawl
Protocols
potential botnet communities
PeerHunter
Peer-to-peer computing
peer-to-peer botnets
P2P hosts detection component
P2P botnets
network security
botnets
Metrics
IP networks
feature extraction
Electronic mail
cyber-crimes
computer network security
Computer crime
Compositionality
community behavior analysis based method
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »