Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by aekwall on Mon, 10/07/2019 - 11:43am
encryption
Resiliency
ransomware attack
Ransomware
pubcrawl
Petya ransomware
Organizations
Mitigations
Metrics
invasive software
heavy ransom
encryption codes
Advance Petya ransomware
Electronic mail
Cyber-security
cyber-attack
cyber world
cyber threats
cyber era
Cryptography
Computer crime
composability
anti-virus detection
biblio
A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
secret sharing
potential alternative
pubcrawl
public cloud data storage services
public cloud storage
public cloud storage service
Rabin's IDA output files
resilience
Resiliency
seamless secret sharing scheme implementation
Secret key
original file
Secure File Sharing
securing data
security
Servers
Shamir's SSA
short term
storage management
targeted file
targeting ordinary nontechnical users
Human behavior
Cloud Computing
Complexity theory
composability
Cryptography
data privacy
data security concern
defined public cloud storage services
defined service providers
file protection
free plans
authentication key
Human Factors
information dispersal
internet
local secure key-store
low-cost digital data
metadata
Metrics
nontechnical user
Organizations
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
A Privacy-Aware PKI System Based on Permissioned Blockchains
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Permissioned Blockchains
security
Scalability
Resiliency
public-key infrastructure
Public key
pubcrawl
privacy-awareness
PKI Trust Models
authentication
Organizations
Metrics
Human behavior
Digital certificate
contracts
component
blockchain security
blockchain
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »