Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security controls
biblio
Security and Privacy
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
security controls
SDN/NFV
mMTC
cyber risk assessment and management
5G Cybersecurity
computer network reliability
policy governance
URLLC
Resiliency
computer theory
threat scenarios
cyber-attacks
Reliability
network function virtualization
defense
computer architecture
mitigation
Compositionality
Complexity theory
Data protection
composability
5G mobile communication
resilience
Metrics
Human behavior
pubcrawl
security
risk management
collaboration
privacy
biblio
Security Controls for Smart Buildings with Shared Space
Submitted by grigby1 on Fri, 01/20/2023 - 5:06pm
Smart Grids
smart building
smart buildings
smart cities
Aerospace electronics
smart grid security
security controls
Metrics
security risks
security
architecture
Object recognition
Scalability
Resiliency
resilience
pubcrawl
IoT
biblio
Cyber Supply Chain Risk Management
Submitted by willirn1 on Tue, 10/26/2021 - 10:59am
systems security engineering
Executive Order 13636
Cyberspace Policy Review
Cybersecurity Strategy and Implementation Plan
Cybersecurity Enhancement Act
Comprehensive National Cybersecurity Initiative
software & firmware
Hardware
cloud & virtualization
Vulnerability Management
C-SCRM
security programs & operations
security measurement
security controls
risk assessment
malware
information sharing
cyber supply chain risk management
controls assessment
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Reliability
dynamic networks
software analysis
offline data analysis
live traffic monitoring
Google Home
Google devices
dynamic analysis security testing infrastructure
Amazon devices
security testing
Amazon Echo
dynamic analysis
Google
testing
security controls
Internet of Things
network traffic
composability
telecommunication traffic
data privacy
IoT devices
computer network security
Resiliency
resilience
Metrics
pubcrawl
IoT
Monitoring
data analysis
security
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Deep Learning-Based Intrusion Detection for IoT Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
pubcrawl
IoT devices
IoT network
learning (artificial intelligence)
multiclass classification
Network reconnaissance
packet level
pattern classification
Power Grid
IoT dataset
reconnaissance attacks
resilience
Resiliency
Scalability
security controls
telecommunication traffic
Traffic flow
feed-forward neural networks model
communication infrastructure
computer network security
computing infrastructure
deep learning-based intrusion detection
defence networks
Denial of Service attacks
distributed denial of service
Feed Forward Neural Networks
binary classification
feedforward neural nets
field information
healthcare automation
information theft attacks
Internet of Thing
Internet of Things
Intrusion Detection
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
CPS resilience
Compositionality
cyber security
Human behavior
Networked Control Systems Security
pubcrawl
resilience
Resiliency
SCADA system
SCADA systems
security
security controls
Threat Modeling
vulnerability assessment
1
2
next ›
last »