Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Terrorism
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
Temporal analysis of radical dark web forum users
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
post polarity
temporal analysis
social networking (online)
Social network services
social media sites
sentiment analysis program
sentiment analysis
radical users
radical scores
radical dark Web forum users
radical actions
pubcrawl
POS tagger
Terrorism
internet
Data mining
dark web
Conferences
security of data
Human Factors
natural language processing
Human behavior
biblio
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
government data processing
Web resource discovery
Web pages
Uniform resource locators
Tor
Terrorism
surface Web
search engines
information retrieval
I2P
hybrid focused crawling
homemade explosives discovery
pubcrawl
Freenet
focused crawling
explosives
Darknets
Crawlers
Context
classifier-guided hyperlink selection strategy
internet
dark web
Human Factors
Human behavior
profile
John Cote
Education
terrorism studies
Terrorism
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking
biblio
Visual structures for seeing cyber policy strategies
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
information synthesis
visualization
visual structures
Verizon 2014 Data Breach Report
terrorist attack
Terrorism
Situation Awareness
security of data
pubcrawl170109
Organizations
information visibility
Complexity theory
Human-computer interaction
Data visualization
data visualisation
cyber security policy
cyber security
cyber policy strategies
cyber incident detection
Cyber Attacks
computer security
biblio
A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students
Submitted by BrandonB on Wed, 05/06/2015 - 9:49am
HS
terrorism studies
Terrorism
security of data
risk management
public sectors
proposed curriculum
private sectors
policy development
Information systems
information security education
information security
computer aided instruction
homeland security students
Homeland security education
higher education
further education
educational courses
education
Cyberspace
cybersecurity education
cyber security principles
Computers
computer security
biblio
Collaboration Pattern and Topic Analysis on Intelligence and Security Informatics Research
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
network security
topic analysis
Terrorism
social networking (online)
Social network services
social network analysis approach
social network analysis
small-world effect
security of data
scale-free property
collaboration
ISI
Intelligent systems
intelligence and security informatics research
Intelligence and Security Informatics
Informatics
groupware
computer security
collaboration pattern
« first
‹ previous
1
2
3