Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
pubcrawl170109
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by
grigby1
on Tue, 03/07/2017 - 12:44pm
alert management
Algorithm design and analysis
clustering algorithm
Clustering algorithms
Computer crime
computer network security
cyber-range simulation dataset
DDoS Attacks
digital forensic analysis
Digital Forensics
distributed denial-of-service
distributed denial-of-service (DDoS) detection
Entropy
entropy clustering approach
false positive rate
feature extraction
forecasting
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
pattern clustering
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
biblio
Global adversarial capability modeling
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
carding shops
Communities
Computer crime
Computer hacking
Credit cards
cyber defenses
cyber security
cyber threat detection
cybercriminals
Cybersecurity
hacker forums
Hacker IRC
hacker Web
information retrieval
information retrieval techniques
IRC channels
learning (artificial intelligence)
machine learning methodology
online hacker communities
pubcrawl170109
Servers
threat identification
threats
vulnerabilities
Web sites
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
Companies
Credit cards
crime science
crime script
Decision Making
decision-making
identity theft
modelling language
pubcrawl170109
quantitative decision analysis
requirements engineering
Risk
risk assessment
risk management
security
security decision-making
security of data
security risk
security threat
software engineering
uncertainty
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
scalable security event aggregation
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
biblio
Managing Emergent Ethical Concerns for Software Engineering in Society
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
citizen science
cyber crime
emergent ethical concern management
ethical aspects
ethics
law enforcement
Media
pubcrawl170109
Societies
society projects
Software
software engineering
software in society
software management
Stakeholders
biblio
Flooding attacks detection in MANETs
Submitted by
grigby1
on Tue, 03/07/2017 - 12:43pm
Ad hoc networks
ah hoc on-demand distance vector
AODV
Computer crime
computer network security
computer networks
denial of service
DoS
flooding attack detection
IP networks
MANET
mobile ad hoc networks
pubcrawl170109
route discovery
Routing
Routing protocols
RREQ flooding attacks
security threats
statistical analysis
telecommunication traffic
traffic generation
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by
grigby1
on Tue, 03/07/2017 - 12:42pm
authentication
certificate revocation list
certificate-less PKI
collusion attack
Collusion Attacks
complex certificate verification process
Computer crime
delegated trusted authorities
denial of service attack
Denial of Service attacks
digital signatures
lower authentication delay
mobile radio
preauthentication mechanism
pubcrawl170109
Public key
public key cryptography
road side units
Schnorr signature
secure public key regime
vehicles
vehicular networks
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by
grigby1
on Tue, 03/07/2017 - 12:42pm
advanced persistent threat
APT
auditing logs
Computer crime
Computers
cyber security incident
cyberattacks
cybercrime investigation
cyberspace battle
digital data
digital evidence
digital forensic practitioner
Digital Forensics
digital triage forensics
evidence dynamics identification
golden triangle components
Nonvolatile memory
people-process-technology-strategy model
Plugs
PPTS model
pubcrawl170109
Random access memory
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by
grigby1
on Tue, 03/07/2017 - 12:42pm
Bluetooth
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
C&C channels
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
financial threat
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
pattern classification
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
1
2
3
4
5
6
7
next ›
last »