Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Detecting Blockchain Security Threats
Submitted by grigby1 on Tue, 04/27/2021 - 2:19pm
insider threat
Organizations
security
Monitoring
blockchain
pubcrawl
resilience
Resiliency
Scalability
information security
Measurement
distributed ledger
permissioned blockchain
Fabrics
security monitoring
biblio
Blockchain-based open infrastructure for URL filtering in an Internet browser
Submitted by grigby1 on Tue, 04/27/2021 - 2:15pm
Metrics
URL filtering
optimum block size
Internet security
Uniform resource locators
Synchronization
Browser Security
Compositionality
Browsers
Organizations
smart contracts
blockchain
Prototypes
internet
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
Resiliency
low-cost technical solutions
insider threat control deployment
insider risk mitigation
high-level categories
insider threat program
risk analysis
Metrics
Law
Software
tools
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
security
Organizations
insider threat
security of data
biblio
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
ontologies (artificial intelligence)
Taxonomies
OWL
insider threat research
insider threat definitions
insider
definitions
conceptual model
Educational institutions
software engineering
Ontology
taxonomy
insider threat
Ontologies
Metrics
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
software engineering
software installation
Sociotechnical
sabotage
Materials
insider threats indicators
insider threat cases
insider IT sabotage
indicators
Educational institutions
chronological timelines
attack planning
Weapons
insider threat
Metrics
information technology
Databases
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »