Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hackers
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Internet of Things: An Analysis and Proposal of White Worm Technology
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
invasive software
white worm technology
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
malware
IoT devices
attack surface
Internet of Things devices
Internet of Things
infiltrating malware
hackers
Grippers
Government
computer network security
Companies
biblio
The cyber deterrence problem
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
Decision Making
strategic assets
state actors
rational deterrence theory
Punishment
Presses
Nuclear weapons
missiles
leverage relevant examples
hackers
digital tools
digital age
deterrence frameworks
Deterrence
denial
Scalability
cyber deterrence problem
cyber
cultural aspects
cross-domain signaling
Credibility
cognitive theories
adept hackers
Cyberspace
resilience
tools
Computer crime
pubcrawl
Human behavior
biblio
Russian Hacker False Flags Work - Even After They're Exposed
Submitted by willirn1 on Wed, 09/25/2019 - 2:55pm
Cognitive Security
Cognitive Security in Cyber
hackers
biblio
Hacker Psychology: Understanding the 4 Emotions of Social Engineering
Submitted by willirn1 on Wed, 09/25/2019 - 2:51pm
Cognitive Security in Cyber
Cognitive Security
hackers
hacker psychology
biblio
How to hack the hackers: The human side of cybercrime
Submitted by willirn1 on Tue, 09/24/2019 - 2:50pm
Cognitive Security
Cognitive Security in Cyber
hackers
Hacking
Cybercrime
biblio
HADES misleads hackers by creating an alternate reality
Submitted by willirn1 on Tue, 09/24/2019 - 2:25pm
Cognitive Security
Cognitive Security in Cyber
hackers
Alternate Reality
biblio
Winter Olympics hack shows how advanced groups can fake attribution
Submitted by willirn1 on Wed, 09/11/2019 - 9:40am
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
hackers
Hacking
Winter Olympics
Cognitive Security
Articles of Interest
C3E 2019
biblio
Cyber security in smart grid convolution networks (SGCNs)
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Monitoring
Smartgrid Convolution
Smart Grids
smart grid security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Cloud Computing
mitigation
Metrics
Meters
hackers
Fog Computing Security vulnerability
computer security
Cloud Service Delivering
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
1
2
next ›
last »