Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
tools
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by
grigby1
on Thu, 02/14/2019 - 10:19am
Databases
tools
pubcrawl
Metrics
composability
Androids
taint analysis
Forensics
android
mobile computing
Humanoid robots
Mobile handsets
mobile device
Digital Forensics
Android app forensics
app-generated evidence
automated mobile app analysis tool
benchmark apps
digital forensic
digital forensic practitioners
dynamic Taint analysis tool
forensic evidentiary data
law enforcement investigators
Manuals
mobile forensic toolkits
online app stores
real-world Android apps
real-world apps
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by
grigby1
on Thu, 02/14/2019 - 10:19am
security
tools
Open Source Software
pubcrawl
Metrics
composability
Benchmark testing
invasive software
taint analysis
android
Android (operating system)
attacks
Google
mobile computing
reachability analysis
analysis effectiveness
Android devices
Android ecosystem
differencing
Evolution
EVOTAINT
historical versions
incremental
incremental taint analysis
real-world evolving Android apps
representative precise taint analysis
security vulnerabilities
simultaneous scalability
taint checking
user apps
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by
grigby1
on Fri, 02/08/2019 - 3:38pm
internet
data privacy
security
tools
resilience
pubcrawl
Human behavior
Resiliency
Scalability
Human Factors
telecommunication security
performance evaluation
computer network security
operating systems
authorisation
Fingerprint recognition
IP networks
attack actions
completeness attack vectors
fingerprint low-interaction honeypots
fingerprinting attack tools
fingerprinting detection mechanism
fingerprinting techniques
fuzzy set theory
fuzzy technique
inhibiting fingerprinting attacks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
Probes
TCPIP
Windows - KFSensor
honey pots
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by
grigby1
on Fri, 02/08/2019 - 3:37pm
Computer crime
Computer hacking
cyber security
data analysis
honey pots
honeypot
Honeypot Analysis
honeypot data
Honeypot in the cloud
Honeypot Results
Honeypott
Human behavior
Human Factors
password
pubcrawl
Ransomware
resilience
Resiliency
Scalability
security of data
tools
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by
grigby1
on Fri, 02/08/2019 - 3:29pm
Databases
Predictive models
safety-critical software
security of data
tools
resilience
Temperature sensors
pubcrawl
Metrics
Resiliency
composability
graph theory
Cybersecurity
cyber-physical systems
attack graph
attack graph system state
cyber-physical system
formal verification
hybrid attack graph
Inductors
nuclear engineering computing
nuclear research reactor
safety-critical applications
SCADA System Security
security testing
state estimation
verification procedure
Vulnerability Evaluation
attack graphs
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by
grigby1
on Fri, 02/08/2019 - 3:28pm
security of data
tools
resilience
pubcrawl
Metrics
Resiliency
composability
graph theory
Communication networks
Servers
Vulnerability
Firewalls (computing)
attack graph
attack path depth
attack path number
attacker
cognition
generation attack graph
LAPA framework
logic-based attack graph
logical language
logical property specification
logical reasoning algorithm
model checking
network risk
network security risk
network vulnerability analysis methods
potential attack
attack graphs
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by
grigby1
on Thu, 01/31/2019 - 11:19am
anonymity
anonymity network users
Bandwidth
composability
Cryptography
data privacy
dataset
encrypted anonymity network traffic
encryption
flow analysis approach
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
machine learning
Metrics
Protocols
pubcrawl
resilience
Resiliency
telecommunication traffic
tools
Tor
Traffic flow
traffic flow behavior
traffic flow Identification
biblio
On Detecting Manifestation of Adversary Characteristics
Submitted by
grigby1
on Mon, 01/21/2019 - 11:38am
Adversary characteristics
Adversary Models
Communication system security
computer security
Data models
Human behavior
machine learning
Metrics
Predictive models
pubcrawl
Resiliency
risk-averse
Scalability
tools
Training
Wireless communication
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by
grigby1
on Mon, 01/21/2019 - 11:37am
security of data
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
microsoft windows
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
enterprise networks
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
network-based intrusion systems
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by
grigby1
on Mon, 01/21/2019 - 11:37am
security of data
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
malware
Browsers
operating system
Universal Serial Bus
cyber-attacks
advanced persistent threats
APT attacks
advanced persistent threat attacks
antivirus software
APT threat vectors
Firewalls (computing)
mitigation
multiple simulated attacks
Payloads
spearphishing
virtualized environment
vulnerabilities
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »