Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cowrie
biblio
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
Submitted by grigby1 on Thu, 06/09/2022 - 2:53pm
traffic control
ssh-attacks
cyber-threat intelligence
Resiliency
Cowrie
honey pots
honeypots
Malicious Traffic
Human Factors
botnet
Monitoring
password
Object recognition
internet
Scalability
resilience
pubcrawl
IP networks
Servers
biblio
Medium Interaction Honeypot Infrastructure on The Internet of Things
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
Internet of Things
security
pubcrawl
resilience
Hardware
performance evaluation
Scalability
malware
Dictionaries
Feeds
Human Factors
honey pots
honeypot
Cowrie
Resiliency
Medium interaction
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
cyber attack
℡NET
Resiliency
Cowrie
SSH
honeypot
honey pots
Particle measurements
Human Factors
tools
Protocols
Scalability
Safety
resilience
pubcrawl
IP networks
risk management
information security
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet