Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk
Submitted by grigby1 on Fri, 04/14/2023 - 4:07pm
ethics
Splunk Tool
IP Detection
grasping
ethical hacking
Creating Alerts
Brute Force Prevention
passwords
brute force attacks
collaboration
renewable energy sources
Force
Big Data
policy-based governance
Human Factors
Human behavior
pubcrawl
information security
biblio
Identification of Attack Paths Using Kill Chain and Attack Graphs
Submitted by grigby1 on Fri, 04/14/2023 - 4:04pm
cyberattack
CVE
asset management
Resiliency
Chained Attacks
Kill Chain
MITRE ATT&ck
STRIDE
threat identification
Organizations
Reconnaissance
attack graph
Force
Standards organizations
Scalability
Generators
resilience
pubcrawl
biblio
Open Source Software Computed Risk Framework
Submitted by grigby1 on Fri, 03/31/2023 - 11:21am
pubcrawl
resilience
Correlation
Scalability
Ecosystems
information technology
Big Data
computer security
Measurement
Force
big data security metrics
Resiliency
codes
data analysis
Prediction methods
biblio
Ransomware Vulnerability used in darknet for web application attack
Submitted by grigby1 on Fri, 03/17/2023 - 11:59am
security
pubcrawl
Metrics
resilience
Resiliency
Industries
composability
Force
Web servers
Ransomware
Turning
Solids
Darknet Marketplace
Netnographic
RaaS Malware
biblio
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Submitted by aekwall on Fri, 02/17/2023 - 10:45am
Force
pubcrawl
Resiliency
Reinforcement learning
Software algorithms
traffic control
Predictive Metrics
Memory management
Filtering
Router Systems Security
filtering algorithms
distributed denial of service
hierarchical heavy hitters
Software Defined Networks
biblio
A Secure and Practical Sample-then-lock Scheme for Iris Recognition
Submitted by grigby1 on Fri, 02/03/2023 - 5:08pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Cryptography
Entropy
Force
Stability analysis
Resists
Pattern recognition
codes
pattern locks
biblio
Intrusion Detection using a Graphical Fingerprint Model
Submitted by grigby1 on Fri, 02/03/2023 - 3:51pm
Databases
subgraph matching
graph database
Attack fingerprint
SQL injection detection
passwords
SQL injection
Force
Fingerprint recognition
intrusion detection system
Organizations
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Situational Control of Cyber Security in Socio-Cyber-Physical Systems
Submitted by aekwall on Fri, 01/20/2023 - 4:12pm
composability
control systems
Cybersecurity
Cyberspace
Force
human computer interaction
integrated circuits
Predictive Metrics
process control
pubcrawl
Resiliency
security situational awareness
situational awareness
situational control
socio-cyber-physical system
Transforms
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »