Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 8:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
Data Breach and Multiple Points to Stop It
Submitted by aekwall on Wed, 05/08/2019 - 8:46am
Access Control
Human behavior
pubcrawl
Metrics
insider threat
Anomaly Detection
software security
resilience
Data Breach
data loss prevention
inadvertent data leak
multiple point of prevention
Ransomware
Security Practices
system security
biblio
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
Submitted by aekwall on Wed, 05/08/2019 - 8:46am
security
Internet of Things (IoT)
Human behavior
pubcrawl
Metrics
insider threat
resilience
Penetration Testing
Pepper
Robot
biblio
Role-based Log Analysis Applying Deep Learning for Insider Threat Detection
Submitted by aekwall on Wed, 05/08/2019 - 8:46am
log data analysis
resilience
insider threat
Metrics
deep learning
pubcrawl
Human behavior
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
Insider Threat Event Detection in User-System Interactions
Submitted by grigby1 on Wed, 05/30/2018 - 2:57pm
Anomaly Detection
Bipartite graph
community structure
graph mining
Human behavior
Human Factors
ibm rational clearcase
insider threat
Metrics
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
biblio
Complexity of Insider Attacks to Databases
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
complexity analysis
composability
Human behavior
insider threat
Metrics
pubcrawl
query intent
query logs
relational database security
resilience
Resiliency
Security Risk Management
Threat Modeling
biblio
Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
Submitted by grigby1 on Mon, 04/30/2018 - 2:26pm
Compliance
information systems security
information systems security policy
insider threat
noncompliance
pubcrawl
review
security policies
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
Modeling User Communities for Identifying Security Risks in an Organization
Submitted by grigby1 on Mon, 03/05/2018 - 12:23pm
security of data
Peer-to-peer computing
Personnel
production environment
pubcrawl
resilience
Resiliency
Scalability
security
peer to peer security
security risks
team working
tools
UEBA
User and Entity Behavior Analytics
user communities
user feedback
Measurement
Companies
entity behavior analytics
feature-based weight assignments
Human behavior
Human Factors
insider threat
Louvain method
Louvain modularity
community detection
Metrics
network traffic
Niara's data
optimization
peer group creation
Peer grouping
peer grouping employees
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »