Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber domain
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 11:04am
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
Take the rein of cyber deterrence
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
escalation control
uncertainty
surprising effect
security of data
Scalability
resilience
pubcrawl
learning (artificial intelligence)
Law
Human behavior
Complexity theory
employment law
Economics
dynamic retaliation
deterrence strategies
Deterrence
Cyberspace
cyber domain
cyber deterrence
cyber conflicts
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior
biblio
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures
Submitted by BrandonB on Mon, 05/04/2015 - 1:18pm
government personnel
threat identification framework
security of data
proactive framework
private business
physical weapons
malicious actor
Law
internet
international norms
international constructs
internally based cyberthreat countermeasures
active cyberdefense
Government
Educational institutions
cyberweapons
Cyberspace
cyberdefenders
cyber domain
computer security
attribution agnostic cyberdefense constructs
attribution agnostic cyberdefense construct
anonymity protection
Active Defense