Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
rootkit
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
invasive software
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
cyber physical systems
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
cyber attack
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
Ransomware Injection
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
biblio
Hidden Process Detection for Windows Operating Systems
Submitted by
grigby1
on Mon, 03/26/2018 - 11:58am
audit system
composability
Computational efficiency
data encapsulation
descriptor based method
hidden process detection
Indexes
information security monitoring
Libraries
Metrics
Microsoft Windows (operating systems)
Monitoring
monitoring system
opened windows based method
operating system kernels
PID based method
pubcrawl
resilience
Resiliency
rootkit
security
security of data
software development
system call based method
user mode
Windows operating system
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by
grigby1
on Tue, 01/16/2018 - 5:26pm
9-1-1 DDoS
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
cellular identifiers
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
DDoS
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
Mobile handsets
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by
abfox
on Tue, 02/14/2017 - 12:33pm
advanced persistent threat
advanced persistent threats
captured memory dump analysis
Digital Forensics
execution time measurement
hypervisor
intrusion detection system
invasive software
Kernel
LibVMI open source tool
live virtual machine RAM dump
malware
memory forensic analysis
memory forensic analysis tool
pubcrawl170101
public domain software
Random access memory
rootkit
semantic gap
Semantics
spyware
storage management
virtual infrastructure privileged access
virtual machine introspection
Virtual machine monitors
virtual machine volatile artifact analyzers
virtual machines
Virtual machining
virtualisation
virtualization environment