Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data visualization
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 10:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by grigby1 on Thu, 03/28/2019 - 3:13pm
cyber situational awareness
visualisation techniques
Royal Military Academy
operational picture
military commanders
Information systems
CyHSA
CyCOP
Cyber Hybrid Situational Awareness
cyber defense situational awareness
cyber defence implications
cyber common operational picture
Belgium
3D visualization
3D Operational Picture
situational awareness
security
Data visualization
data visualisation
Security Metrics
Comparative Analysis
Three-dimensional displays
Servers
military communication
military computing
composability
Resiliency
Metrics
pubcrawl
resilience
tools
security of data
biblio
Research of Security Situational Awareness and Visualization Approach in Cloud Computing
Submitted by grigby1 on Thu, 03/28/2019 - 3:12pm
data visualisation
storage resource utilization
standardization
situational information
situational awareness
security situational awareness
secure information
high-efficiency advantage
emergency response methods
elastic resource pooling
cloud computing security
Data visualization
Cloud Computing
network security
security events
sensors
resource allocation
composability
Resiliency
Metrics
pubcrawl
resilience
Computational modeling
security of data
biblio
MARCS: Mobile Augmented Reality for Cybersecurity
Submitted by grigby1 on Mon, 11/19/2018 - 12:27pm
augmented reality
Cybersecurity
Data visualization
Human behavior
Human Factors
pubcrawl
biblio
EntropyVis: Malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:55pm
malicious Windows Portable Executable files
visualization analysis
visualization
Resiliency
resilience
pubcrawl
privacy
nearest neighbour methods
Metrics
malware writers
malware variants
malware similarity
malware features
malware classification
malware
Brightness
local entropy images
kNN algorithm
k-Nearest Neighbor classification algorithm
Jaccard index
invasive software
image classification
Human behavior
Generators
feature extraction
EntropyVis
entropy pixel images
Entropy
Data visualization
data visualisation
biblio
Real-Time Identification of Dynamic Events in Power Systems Using PMU Data, and Potential Applications #8212;Models, Promises, and Challenges
Submitted by el_wehby on Mon, 05/14/2018 - 2:23pm
Power system dynamics
Voltage measurement
transmission systems
Switches
situational awareness
real-time identification
power transmission protection
power systems
power system stability
power system security
power system protection security
classification
Power measurement
PMU data
Phasor measurement units
phasor measurement
pattern creation
dynamic events
Data visualization
data communications
cyberattack
1549831
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability
biblio
An interactive, extensible environment for power system simulation on the PMU time frame with a cyber security application
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
Phasor measurement units
visualization
smart grid technology
smart grid security
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system simulation
Power system dynamics
power system control
power grid simulation
PMUs
PMU time frame
c37.118
phasor measurement
Metrics
Mathematical model
Load modeling
interactive environment
interactive control action
interactive control
Generators
extensible environment
Data visualization
data visualisation
cyber security application
cyber security
Computational modeling
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »