Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data visualisation
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
cyber situational awareness
visualisation techniques
Royal Military Academy
operational picture
military commanders
Information systems
CyHSA
CyCOP
Cyber Hybrid Situational Awareness
cyber defense situational awareness
cyber defence implications
cyber common operational picture
Belgium
3D visualization
3D Operational Picture
situational awareness
security
Data visualization
data visualisation
Security Metrics
Comparative Analysis
Three-dimensional displays
Servers
military communication
military computing
composability
Resiliency
Metrics
pubcrawl
resilience
tools
security of data
biblio
Research of Security Situational Awareness and Visualization Approach in Cloud Computing
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
data visualisation
storage resource utilization
standardization
situational information
situational awareness
security situational awareness
secure information
high-efficiency advantage
emergency response methods
elastic resource pooling
cloud computing security
Data visualization
Cloud Computing
network security
security events
sensors
resource allocation
composability
Resiliency
Metrics
pubcrawl
resilience
Computational modeling
security of data
biblio
EntropyVis: Malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
malicious Windows Portable Executable files
visualization analysis
visualization
Resiliency
resilience
pubcrawl
privacy
nearest neighbour methods
Metrics
malware writers
malware variants
malware similarity
malware features
malware classification
malware
Brightness
local entropy images
kNN algorithm
k-Nearest Neighbor classification algorithm
Jaccard index
invasive software
image classification
Human behavior
Generators
feature extraction
EntropyVis
entropy pixel images
Entropy
Data visualization
data visualisation
biblio
An interactive, extensible environment for power system simulation on the PMU time frame with a cyber security application
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Phasor measurement units
visualization
smart grid technology
smart grid security
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system simulation
Power system dynamics
power system control
power grid simulation
PMUs
PMU time frame
c37.118
phasor measurement
Metrics
Mathematical model
Load modeling
interactive environment
interactive control action
interactive control
Generators
extensible environment
Data visualization
data visualisation
cyber security application
cyber security
Computational modeling
biblio
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Submitted by K_Hooper on Wed, 02/14/2018 - 11:02am
Human-computer interaction
visualization
user study
T-Viz
trust visualisations
Trust visualisation
Color
data visualisation
Decision Making
Human behavior
trust statements
human computer interaction
human trust
psychology
pubcrawl
Radar
Reliability engineering
stars interface
Trusted Computing
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 3:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
biblio
VR City: Software Analysis in Virtual Reality Environment
Submitted by K_Hooper on Wed, 01/10/2018 - 10:11am
software metrics
VR City
visualize method
visualization
virtual reality environment
virtual reality
Urban areas
Three-dimensional displays
source code modifications
source code browsing feature
software visualization tool
software visualization
Software systems
software system
Buildings
software cities
software aspects
software analysis
Resiliency
pubcrawl
program execution
new layouting algorithm
modified city metaphor
Layout
immersive systems
Human behavior
data visualisation
composability
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
intrusion detection dataset toolkit
user defined synthetic attacks
telecommunication traffic
security of data
pubcrawl170109
Ports (Computers)
network traffic
network attacks
labeled dataset creation
IP networks
Intrusion Detection Systems
Computer crime
Intrusion Detection
IDS
ID2T
Entropy
DIY dataset creation toolkit
defense tool
Data visualization
data visualisation
Data mining
cyber-attacks
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
« first
‹ previous
1
2
3
4
5
next ›
last »