Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Terrorism
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 12:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 10:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Drone Detection in Long-Range Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 9:27am
learning (artificial intelligence)
Videos
video surveillance
Training
tracking surveillance
Terrorism
SSD
single shot detector
security of data
security breaches
Resiliency
pubcrawl
Proposals
object detection
Metrics
long-range surveillance videos
deep video
Human behavior
high-security risks
Faster-RCNN
Faster R-CNN
drones
drone detection
Detectors
detection methods
deep learning-based object detection
deep learning
convolutional neural nets
CNN-based architectures
Birds
autonomous aerial vehicles
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
Terrorism
information technology security
government data processing
cyber security countermeasures
Cyber defence
social aspects of automation
cyber deterrence
Computers
cyber defense
cyber terrorism
security of data
Cyberspace
resilience
Government
Deterrence
internet
pubcrawl
Human behavior
Scalability
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
biblio
Binding the Physical and Cyber Worlds: A Blockchain Approach for Cargo Supply Chain Security Enhancement
Submitted by aekwall on Mon, 04/01/2019 - 9:04am
international trade
U.S.
Transportation
terrorist attacks
Terrorism
supply chains
supply chain stakeholders
supply chain management
security of data
security
securing cargo transportation
Public key
pubcrawl
physical cargo movements
maritime transportation
maritime cargo tracking system
binding scheme
Inspection
information management
illicit activities
goods distribution
globalisation
global economies
freight handling
digital identity management mechanism maps
cyber world
Companies
cargo supply chain security enhancement
cargo inspection
blockchain-based cargo management system
blockchain security
blockchain
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 5:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Scalability
psycholinguistic features
pubcrawl
Random Forest
regression analysis
Resiliency
Russian language
Russian legislation
Russian-speaking illegal text material
psych olinguistic features
semantic features
Semantics
Social network services
Support vector machines
Terrorism
text analysis
text classification
text detection
Human behavior
Bayes methods
classification methods
classification quality
Dictionaries
differentiating feature
extremist texts
feature extraction
gradient boosting
automatic extremist text detection
learning (artificial intelligence)
linear SVM
linguistic features
logistic regression
multinomial naive Bayes
natural language processing
pattern classification
Pragmatics
« first
‹ previous
1
2
3
next ›
last »