Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fraud
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Complex Networks Monitoring and Security and Fraud Detection for Enterprises
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
business data processing
complex networks
complex networks monitoring
Compositionality
CoNeSec track
Data mining
data privacy
enterprises
fraud
fraud detection
Human Factors
network log data
pubcrawl
Resiliency
security
Smart Grid Sensors
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
biblio
Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World
Submitted by grigby1 on Mon, 05/22/2017 - 2:07pm
android
finance
fraud
Human behavior
Human Factors
ICTD
mBanking
Metrics
mobile money
pubcrawl
threat vectors
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
« first
‹ previous
1
2
3
4
next ›
last »