Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security controls
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
file
Mismorpism: a Semiotic Model of Computer Security Circumvention
Submitted by sean.w.smith on Wed, 05/06/2015 - 12:18pm. Contributors:
Sean Smith
Ross Koppel
Jim Blythe
Vijay Kothari
Human Factors
Security Circumvention
security controls
HotSoS 2015
Academia
Poster
Posters
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Wed, 05/06/2015 - 10:48am
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Thu, 04/30/2015 - 2:15pm
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
« first
‹ previous
1
2