Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Terrorism
biblio
Enhancing Privacy and Security in Crowds using Fog Computing
Submitted by grigby1 on Fri, 07/21/2023 - 1:48pm
privacy
security
pubcrawl
resilience
Scalability
data privacy
Prototypes
Fog computing
Internet of Things
location based services
Terrorism
Personnel
Resiliency
music
location awareness
Crowd management
biblio
Understanding Dark Web: A Systematic Literature Review
Submitted by grigby1 on Fri, 06/02/2023 - 4:30pm
pubcrawl
Bibliographies
dark web
Human behavior
Human Factors
Measurement
social networking (online)
systematic literature review
Systematics
Terrorism
Web 2.0
biblio
Predicting Terror Attacks Using Neo4j Sandbox and Machine Learning Algorithms
Submitted by grigby1 on Fri, 03/17/2023 - 12:14pm
resilience
Neo4j Sandbox
Machine Learning Graph Database
relational database security
graph embedding
Terrorism
composability
Computational modeling
Resiliency
deep learning
Metrics
Human behavior
pubcrawl
Support vector machines
machine learning algorithms
relational databases
Predictive models
biblio
A comparitative study of machine learning models for the detection of Phishing Websites
Submitted by grigby1 on Fri, 02/03/2023 - 5:23pm
Training
Predictive models
machine learning
pubcrawl
Human behavior
Phishing
Web pages
Uniform resource locators
detection
Weapons
Terrorism
phishing Websites
biblio
Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:06am
integrated circuits
Intrusion Detection
Resiliency
composability
machine learning
cyber-physical systems
SCADA systems
cyber-attacks
industrial control
pubcrawl
Terrorism
Cyber Physical Systems (CPS)
IDS
Intrusion Detection Systems (IDS)
machine learning (ML)
Systematic Literature Review (SLR)
biblio
Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques
Submitted by grigby1 on Mon, 06/06/2022 - 12:56pm
Training
machine learning
pubcrawl
Scalability
Databases
natural language processing
Weapons
Terrorism
Human Factors
law enforcement
human in the loop
human-in-the-loop
information extraction
biblio
Asymmetric Analysis of Anti-Terrorist Operations and Demand for Light Weapons under the Condition of Informationization
Submitted by grigby1 on Tue, 04/26/2022 - 10:35am
pubcrawl
Weapons
Training
Terrorism
Technological innovation
small arms
Scalability
Resiliency
resilience
Anti-terrorist operations
Informationization
Information age
Image Processing
Human behavior
Deterrence
Cyberspace
Asymmetry
biblio
Cyber Warfare Threat Categorization on CPS by Dark Web Terrorist
Submitted by grigby1 on Tue, 04/12/2022 - 12:12pm
Training
machine learning
pubcrawl
Human behavior
Web pages
tagging
Weapons
dark web
Tor
Terrorism
supervised learning
categorization
cyber warfare
Cyber-Physical Systems (CPS)
biblio
Intrusion Detection from Synchrophasor Data propagation using Cyber Physical Platform
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
analysis and detection
Cyber Physical System
Intrusion Detection
microgrid
Microgrids
Phasor measurement units
power system stability
pubcrawl
real-time systems
Resiliency
synchrophasor
Technological innovation
Terrorism
US government
biblio
A Social Network Analysis and Comparison of Six Dark Web Forums
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
network centrality analysis
whistle-blowing
underground communities
tools
Terrorism
structural patterns
social networking (online)
social network analysis tools
social network analysis
social interactions
pubcrawl
privacy
posting activities
post discussion data
online communities
central nodes post
interaction graphs
Instruction sets
Human Factors
Human behavior
Hacking
drugs
data privacy
dark Web forums
dark web
Cryptography
criminal interests
content ranging
Computer crime
1
2
3
next ›
last »