Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IT infrastructure
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by grigby1 on Mon, 12/10/2018 - 10:38am
OS images
zero-day resistant malware detection method
Zero-day resistance
Zero-day attacks
Zero day attacks
user machine
tools
SVM
Support vector machines
security of data
sandboxing techniques
Resiliency
resilience
pubcrawl
phase exhaustive technique
Cloud Computing
operating systems (computers)
networking schemes
n-class SVM
Metrics
malware
machine learning
IT infrastructure
feature extraction
defense
Conferences
computer security
composability
clouds
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Information Security Maintenance Issues for Big Security-Related Data
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
information security maintenance
security-related data
security of data
security
secure infrastructure
real-time systems
IT infrastructure
ISM
information security maintenance issues
arrays
information security
Distributed databases
Data visualization
Data models
big security-related data
big data protection problem statement
Big Data