Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber criminals
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
BlackWidow: Monitoring the Dark Web for Cyber Security Information
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
illegal services
web services
security analyst users
search engines
pubcrawl
open source intelligence
multiple dark Web
login information
learning (artificial intelligence)
knowledge graph
invasive software
interactive visual exploration
information gathering
information collection
BlackWidow
Human Factors
Human behavior
fraud
Docker-based microservice architecture
Dark Web services
Dark Web analysis
dark web
cybersecurity-related topics
cyber security intelligence purposes
cyber security information
cyber security domain
cyber intelligence
cyber criminals
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Static and Dynamic Analysis of Third Generation Cerber Ransomware
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
malicious ransomware software
third generation cerber ransomware
technical analysis
social power
Resiliency
Ransomware
pubcrawl
political power
official databases
Metrics
malware detection
malware
Big Data
invasive software
encryption
economical scumming
deep learning
cyber terrorism
cyber criminals
Cryptography
criminal justice
Computer crime
composability
Cerber
biblio
Vulnerabilities in two-area Automatic Generation Control systems under cyberattack
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
Power Grid
two-area automatic generation control systems
security of data
security measures
security
Resiliency
pubcrawl
power system stability
power system control
power grids
power grid vulnerability analysis
AGC system
Metrics
Mathematical model
Generators
Gain control
cyberattack
cyber criminals
control engineering computing
composability
automatic generation control
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead