Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attack
biblio
Securing Smart City Networks - Intelligent Detection Of DDoS Cyber Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 2:18pm
Human behavior
traffic control
Smart City
smart cities
Resiliency
resilience
pubcrawl
Neural networks
network security
Metrics
machine learning
DDoS attack detection
denial-of-service attack
deep neural networks
deep learning
DDoS attack mitigation
DDoS
cyber attack
Computational modeling
composability
chatbots
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 2:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Internet of Things based Data Security Management using Three Level Cyber Security Policies
Submitted by aekwall on Fri, 01/13/2023 - 3:53pm
Human Factors
IoT
Internet of Things
Data Security
pubcrawl
Scalability
Metrics
Resiliency
cyberattack
Informatics
cyber security
cyber attack
security policies
security threat
biblio
Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface
Submitted by grigby1 on Fri, 07/29/2022 - 5:13pm
Security by Default
cyber attack
cyber security
internet
IP networks
Linux
Network interfaces
operating systems
Operating systems security
pubcrawl
Raspbian
resilience
Resiliency
security
Servers
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
cyber attack
℡NET
Resiliency
Cowrie
SSH
honeypot
honey pots
Particle measurements
Human Factors
tools
Protocols
Scalability
Safety
resilience
pubcrawl
IP networks
risk management
information security
biblio
Electric Power Grid Resilience to Cyber Adversaries: State of the Art
Submitted by grigby1 on Wed, 04/20/2022 - 11:29am
control systems
CPS resilience
cps resiliency
cyber attack
cyberattack
Cyber Physical Systems (CPS)
energy management system (EMS)
false data injection attack (FDIA)
Intrusion Detection System (IDS)
Monitoring
power grid resilience
pubcrawl
resilience
Smart Grids
biblio
Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model
Submitted by aekwall on Tue, 04/19/2022 - 11:20am
security
Computational modeling
Resiliency
composability
Payloads
Phishing
pubcrawl
SQL injection
cyber attack
MLP
parsing
SQLIA
Structured Query Language
Tagged Patterns
tagging
Cross Layer Security
biblio
An Improved Byzantine Consensus Based Multi-Signature Algorithm
Submitted by grigby1 on Mon, 04/18/2022 - 11:37am
blockchain
component
Computational modeling
Consensus algorithm
consensus mechanism
cyber attack
Data Security
Explosions
formatting
Memory
pubcrawl
Scalability
security scalability
Smart Grid
telecommunication traffic
biblio
Econometric Models for Estimating the Financial Effect of Cybercrimes
Submitted by aekwall on Wed, 04/13/2022 - 10:14am
Computational modeling
Reliability
Computer crime
pubcrawl
Resiliency
Ransomware
cyber attack
Costs
Regulation
Cybercrime
econometric model
economic impact
hidden cost
legislation
monetary cost
Damage Assessment
1
2
3
4
5
next ›
last »