Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Tue, 08/22/2017 - 11:47am
attack-pattern
collaboration
Grammar
Human behavior
Human Factors
insider threat
Insider Threats
Metrics
pubcrawl
Resiliency
security policies
tripwire
biblio
CPAC: Securing Critical Infrastructure with Cyber-physical Access Control
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
insider threat
Metrics
pubcrawl
taint analysis
biblio
Studying Naive Users and the Insider Threat with SimpleFlow
Submitted by grigby1 on Tue, 05/30/2017 - 12:45pm
composability
Information Flow
insider threat
Linux
linux operating systems security
linux security module
Metrics
operating system security
pubcrawl
Resiliency
biblio
Curiosity Killed the Organization: A Psychological Comparison Between Malicious and Non-Malicious Insiders and the Insider Threat
Submitted by grigby1 on Thu, 05/18/2017 - 2:26pm
non-malicious insiders
unintentional acts
trait affect
risk management
Resiliency
pubcrawl
psychological factors
personality
organizational security
Compliance
malicious insiders
intentional acts
insider threat
Human Factors
Governance
expandability
cyber security
Compositionality
biblio
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
ABAC
Access Control
Algorithms
complexity
computer security
graph theory
insider
insider threat
Network reconnaissance
NGAC
NIST
policy machine
pubcrawl
Resiliency
simultaneous instantiation
XACML
biblio
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models
Submitted by grigby1 on Thu, 04/20/2017 - 12:42pm
anomaly detection system
insider threat
machine learning
Network reconnaissance
pubcrawl
Resiliency
biblio
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools
Submitted by grigby1 on Thu, 04/20/2017 - 12:42pm
Anomaly Detection
Damage Assessment
insider threat
log data clustering
Network reconnaissance
outlier detection
pubcrawl
Resiliency
biblio
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance
Submitted by grigby1 on Thu, 04/20/2017 - 12:42pm
advanced persistent threat
insider reconnaissance
insider threat
Network reconnaissance
network security
pubcrawl
Resiliency
software defined networking
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
A Method of Evaluation for Insider Threat
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
pubcrawl
Analytical models
Cloud Computing
Computer crime
Computers
cyber security
Educational institutions
insider threat
insider threat analysis
insider threat evaluation
insider threat mitigation
Organizations
security of data
System Dynamic
vulnerability scanner
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »