Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacker
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
Game-Theoretic Analysis of System of Systems with Inherent Robustness Parameters
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Resiliency
interdependent systems of systems
large-scale infrastructures
Mathematical model
Metrics
Nash Equilibrium
probability
pubcrawl
resilience
inherent robustness parameters
Robustness
Scalability
security
social development
sum-form utility functions
system of systems
system parameters
game theory
Biological system modeling
Compositionality
conditional survival probabilities
cost parameters
Cyber Dependencies
cyber-physical systems
defender
economic development
attacker
game-theoretic analysis
Games
Human behavior
Human Factors
independent systems of systems
infrastructure robustness
infrastructure survival probability
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
computer security
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
Measurement
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
resilience
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
unmanned aerial systems
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
Deployment and analysis of honeypots sensors as a paradigm to improve security on systems
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
security of data
sensor security
Sensor Systems
security breaches
safety gaps
Ports (Computers)
honeypots
honeypot sensors deployment
attacker
Servers
Metrics
Protocols
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Intrusion Detection
security
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
« first
‹ previous
1
2
3
next ›
last »