Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attribution
biblio
“Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
pubcrawl
transparency
state-sponsored cyber attacks
state-avowed cyber conflict
security of data
Scalability
Salisbury poison attack
Russian GRU officers
Resiliency
resilience
public preparedness
attribution
politics
Netherlands intelligence services
NATO
Human behavior
EU nations
Deterrence
cyber policy
cyber conflict
cyber aggressor
biblio
Simplex Based Vector Mapping for Categorical Attributes Clustering
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
human-in-the-loop security center paradigm
Human behavior
pubcrawl
composability
Metrics
attribution
Categorical Attributes
clustering
Simplex Theory
Vector Mapping
biblio
RiskPol : A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
pubcrawl
attribute based access control
attribute forgery
attribution
composability
Human behavior
human-in-the-loop security center paradigm
Metrics
policy bypassing
risk management
zero trust
biblio
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
hardware-in-the-loop
Wide Area Monitoring Protection and Control
wide area monitoring
WAMPAC systems
Substations
substation
smart power grids
Smart Grids
Protection and Control systems
power system forensics
power system analysis computing
PMUs
Phasor measurement units
knowledge based systems
knowledge base
human-in-the-loop security center paradigm
hardware-in-the loop simulation
forensic investigations
Forensic Artifacts
Evidence
authentication
attack-based digital forensic evidences
Digital Forensics
attribution
Metrics
composability
pubcrawl
Human behavior
cyber-attack
Monitoring
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
A Framework for Making Effective Responses to Cyberattacks
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
attribution confidence
USG
U.S. government
suspected attacker
Risk
Response
private sector
policymakers
national intelligence community
Market research
Government
Escalation
effective response decision
Deterrence
decision makers
cyberattack
analysis
attribution
Companies
Decision Making
Computer hacking
Metrics
composability
pubcrawl
Human behavior
Big Data
human-in-the-loop security center paradigm
Computer crime
security of data
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
Deleted Data Attribution in Cloud Computing Platforms
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
human-in-the-loop security center paradigm
Cloud Computing
Human behavior
pubcrawl
composability
Metrics
metadata
attribution
cloud forensic
data acquisition
data deletion
digital forensic
Digital Forensics
file attribution
NIST
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
PATIP-TREE: An Efficient Method to Look up the Network Address Attribution Information
Submitted by aekwall on Mon, 03/04/2019 - 10:45am
IP address attribution information lookup
attribution
traffic engineering
telecommunication network routing
real-time IP address attribution information lookup
Patricia Trie
PATIP-TREE
network traffic engineering
network traffic analysis system
network routing information
named data networking address
IPv6 address
IPv4 address
IP information lookup
human-in-the-loop security center paradigm
Internet Content Provider information
data structures
custom IP address attribution lookup
internet
Databases
Metrics
composability
pubcrawl
Human behavior
real-time systems
security
telecommunication traffic
IP networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »