Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data visualisation
biblio
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
resilience
visualisation tools
visualisation
user experience
unsolicited e-mail
unauthorised access
targeted phishing campaigns
targeted phishing attacks
situational awareness
Security Awareness
Resiliency
authorisation
pubcrawl
phishing attacks
Phishing
Metrics
internet
information security
data visualisation
cyber situational awareness
Computer crime
composability
biblio
Towards Better Utilizing Static Application Security Testing
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
SAST techniques
vulnerability warnings
utilization of software engineering tools
static program analysis
static bug detection
static application security testing
software reliability
software quality
software assurance
security of data
security experts
Scalability
static analysis
SAST product
quality-assurance effort
program testing
program diagnostics
Priv
data visualisation
actionable vulnerability warnings
Resiliency
composability
Human behavior
pubcrawl
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 11:04am
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
A Data Provenance Visualization Approach
Submitted by aekwall on Mon, 09/23/2019 - 9:41am
Data visualization
W3C-PROV-O specification compatible provenance data
social networking (online)
provenance visualization
PROV-O
Prototypes
open source visualization tool
data provenance visualization approach
data lineage
data provenance
Provenance
data visualisation
Big Data
public domain software
data analysis
metadata
tools
Metrics
component
composability
pubcrawl
Human behavior
Resiliency
Classification algorithms
biblio
Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation
Submitted by Katie Dey on Mon, 09/09/2019 - 2:29pm
user evaluation
HMT
Graphics
Computer graphics
visualization
Human-computer interaction
Alex Endert
IN-SPIRE
Computational modeling
Data models
Data visualization
Analytical models
Semantics
cognition
human-in-the-loop system design
model steering functionality
user analytic process
user interaction methodology
analytical reasoning
Computation
visual analytics
semantic interaction
human computer interaction
data visualisation
data analysis
Human Machine Teaming
Interactions
C3E 2019
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by Katie Dey on Mon, 09/09/2019 - 1:14pm
HMT
visualization framework
visualization
security
network security data context
network security
modeling framework
modeling
mission impact situation awareness
mission impact assessment
Knowledge representation
Interactions
Human Machine Teaming
C3E 2019
decision-making
Data visualization
data visualisation
Data models
Dagger framework
Cyberspace
cyber situation awareness
Context modeling
Context
computer network security
Computational modeling
Communication networks
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 9:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
« first
‹ previous
1
2
3
4
5
next ›
last »