Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber threat
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 1:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
The Comparison of Web History Forensic Tools with ISO and NIST Standards
Submitted by grigby1 on Tue, 12/20/2022 - 6:33pm
Browsers
Web Forensics
NIST Standards
History Logs
forensics tools
Forensics Standard
cyber threat
Web Browser Security
Digital Forensics
Compositionality
pubcrawl
ISO standards
NIST
History
internet
Resiliency
resilience
Metrics
Human behavior
biblio
A Study on the Next Generation Security Control Model for Cyber Threat Detection in the Internet of Things (IoT) Environment
Submitted by aekwall on Fri, 09/30/2022 - 1:47pm
Human behavior
Security Platforms
Integrated Security
Commercialization
cyber threat
process control
IoT security
Market research
composability
security
Resiliency
Metrics
pubcrawl
standardization
Computer crime
Internet of Things
IoT
biblio
Trends in Cybersecurity Management Issues Related to Human Behaviour and Machine Learning
Submitted by grigby1 on Thu, 09/29/2022 - 3:38pm
Software measurement
resource management
pubcrawl
Phishing
organisation
Market research
Management
machine learning
Human behavior
deep learning
Cybersecurity
cyber threat
behaviour
trends
Training data
Systematics
biblio
Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation
Submitted by grigby1 on Wed, 04/20/2022 - 2:46pm
computer architecture
Monitoring
pubcrawl
Resiliency
Analytical models
Data models
Computational modeling
Planning
Metrics
Measurement
Vulnerability
modeling and simulation
cyber threat
Cyber Operations
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 2:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
Cyber Risk: The emerging cyber threat to industrial control systems
Submitted by willirn1 on Tue, 10/26/2021 - 3:20pm
cyber risk
C3E
cyber threat
Industrial Control Systems
supply chains
malware
malware attacks
Compromise
distribution
biblio
Cyber Resilience and Response
Submitted by willirn1 on Tue, 10/26/2021 - 3:03pm
cyber resilience
Cyber Response
C3E
cyber threat
Cybersecurity
Risk
Supply Chain Attacks
supply chains
malware
NotPetya
Software
distribution
ransomware attacks
Hardware
Vendors
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
An Resilient Cloud Architecture for Mission Assurance
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
cyber physical environment
Resilient Security Architectures
Resiliency
resource situation generation
resource planning
resilient dual loop architecture
resilient cloud environment
resilient cloud architecture
resilient cloud
perception analysis planning adjustment
mission assurance system deployment mechanism
environment awareness network
dual loop architecture
security of data
complex cyber threat environment
Mission Assurance
cyber threat
Information services
information system
resilience
Information systems
Planning
pubcrawl
computer architecture
Cloud Computing
Monitoring
1
2
next ›
last »