Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
cyber threats
Security Audits
threat profiling
feature extraction and selection
cybersecurity audit execution
cybersecurity audit
complicated cyber landscapes
aggressive cyber landscape
auditing
security of data
Scalability
cyber-attacks
pubcrawl
Human behavior
Resiliency
Feature Selection
feature extraction
cyber-attack
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Machine Learning for Real-Time Data-Driven Security Practices
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
Scalability
national vulnerability database
optimum system parameters
pubcrawl
real-time data-driven security practices
real-time systems
recommender systems
resilience
Resiliency
Memory-Based Collaborative Filtering technique
security of data
similarity-based ranking
Software
user-based
User-Based technique
vulnerability breach
vulnerable organisations
AUC evaluation metric
memory-based
Measurement
learning (artificial intelligence)
Item-Based technique
Item-Based approaches
item-based
Human Factors
damage
cyber-security vulnerability information
cyber-attacks
cyber security information utilising
cyber security
cosine similarity measure
collaborative filtering
collaboration
biblio
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
system reliability
pubcrawl
resilience
Resiliency
security
security assessment
security of data
Simulation Platform
smart meters
strategic control
privacy platform
system resiliency
Temperature control
TES simulation
TESST
testbed
transactive energy
transactive energy security simulation testbed
transactive energy systems
distributed energy resources
blockchain
Computational modeling
cyber-attacks
Cyber Attacks
cyber-physical security
cyber-physical simulation platform
cyber-physical systems
data privacy
decentralized power system control problem
active distribution system operator
distributed power generation
distributed software platforms
financial markets
HVAC
power distribution economics
power distribution reliability
power engineering computing
power system security
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 9:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by willirn1 on Thu, 05/30/2019 - 3:04pm
Internet of Things
Vanderbilt
Transportation
security of data
security economics
security
resilient IIoT systems
resilience
Redundancy
production engineering computing
Investment
actuators
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
control
biblio
Collaborative Model-Based Fallback Control for Secured Networked Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 9:46am
multiple countermeasures
Switches
Sports equipment
Sorting
sensors
security of data
security
secured networked control systems
scalable
Scalability
Resiliency
resilience
pubcrawl
Petri Net
networked control systems
Networked Control Systems Security
Industrial Control Systems
industrial control system security
industrial control
field network signal
cyber-attacks
countermeasure
control engineering computing
collaborative model-based fallback control
collaborative FCS
Collaborative Fallback Control System
collaboration function
collaboration
analog signal
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »