Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
enterprise networks
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by
aekwall
on Mon, 06/10/2019 - 9:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by
aekwall
on Wed, 02/13/2019 - 10:56am
agent addition
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
distributed denial of service
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
Human behavior
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
scalable dispatcher
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by
grigby1
on Mon, 01/21/2019 - 11:37am
security of data
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
microsoft windows
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
enterprise networks
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
network-based intrusion systems
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:31am
Active dependency mapping
artificial degradation
Automated Dependency Mapping
computer security
Conferences
Cyber Dependencies
cyber physical systems
cyber-physical systems
Data-driven approach
Degradation
dependency analysis
dependency relations
distributed processing
distributed systems
Ecosystems
enterprise networks
Information Reuse
interrelated software services
Mission Assurance
network environment
network performance
pubcrawl
quantitative assessment
resilience
Resilience and Robustness
Resiliency
Robustness
security
Software
biblio
Cyber Scanning: A Comprehensive Survey
Submitted by
BrandonB
on Mon, 05/04/2015 - 1:40pm
Protocols
targeted cyber attack
Servers
security of data
Scanning events
Probing campaigns
Probing
Probes
Ports (Computers)
Network reconnaissance
Monitoring
Internet wide services
internet
enterprise networks
distributed cyber scanning detection method
Cyberspace
cyber scanning technique
Cyber scanning