Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business data processing
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
A Layered Graphical Model for Mission Attack Impact Analysis
Submitted by grigby1 on Tue, 02/27/2018 - 1:36pm
Human behavior
unanticipated cyber activities
sockets
Scalability
Resiliency
resilience
pubcrawl
NIST National Vulnerability Database
mission attack impact analysis
military missions
Metrics
Legged locomotion
layered graphical model
Human Factors
attack activities
graph theory
graph levels
Forensics
forensic investigators
Digital Forensics
Cyber Dependencies
Conferences
Computational modeling
Compositionality
Common Vulnerability Scoring System
business missions
business data processing
attack logs
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
encryption
trustworthy access control
trusted platform modules
Trusted Computing
storage management
semantically rich access control system
robust access control
Resiliency
pubcrawl
OWL
Organizations
organization confidentiality policies
Ontologies
Oblivious Storage
end-to-end oblivious data transaction
Access Broker
document security
document handling
data threats
Confidentiality Policy
Computational modeling
composability
cloud storage security
cloud service platform
Cloud Computing
business data processing
authorisation
Access Control
access broker module
biblio
A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Protocols
Virtual private networks
supercomputing user behavior
supercomputing business process
Supercomputers
supercomputer
Security Policies Analysis
security of data
security level optimization
security level improvement
security incident detection
security analysis method
security
resource use tracking
pubcrawl
audit policy
policy-based governance
operation records
operating systems
mass storage
mainframes
log analysis
Linux
Human Factors
Correlation analysis
Correlation
complete user behavior path restoration
collaboration
business data processing
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
SCAP benchmark for Cisco router security configuration compliance
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
OVAL
XCCDF
vulnerability measurement
security of data
security content automation protocol
security compliance
security automation
security
SCAP benchmark
policy compliance evaluation
Science of Security
operating systems
NIST
information security management
Formal Specification
Cisco router security configuration compliance
business data processing
Benchmark testing
automation
pubcrawl
« first
‹ previous
1
2
3
4
5
next ›
last »