Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat analysis
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 11:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
biblio
A Risk Assessment Framework for Automotive Embedded Systems
Submitted by grigby1 on Tue, 09/26/2017 - 12:39pm
automotive security
Human behavior
pubcrawl
Resiliency
risk assessment
Scalability
Security Audits
security requirements
threat analysis
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
A simulated criminal attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
a simulated criminal attack
advanced attack
branch office attack exercise
branch office attack plan
Computer crime
firewalls
head office attack exercise
head office attack plan
on-site reconnaissance
pubcrawl170109
Red Team exercise
remote information gathering
spear phishing exercise
spear phishing plan
threat analysis
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 11:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
Towards trustworthy complex event processing
Submitted by BrandonB on Thu, 04/30/2015 - 3:05pm
Fault tolerant systems
trustworthy
Trusted Computing
trust
threat analysis
Synchronization
soft realtime computing
Servers
Runtime
mission-critical applications
minimum runtime overhead
Intrusion Detection
intelligent computing
actionable situational knowledge
fault tolerance
event processing operations
Dependable Computing
Context
complex event processing
Byzantine Fault Tolerance
business intelligence
Business
Big Data
application semantics
algorithmic stock trading
« first
‹ previous
1
2