Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Workstations
biblio
An Approach for P2P Based Botnet Detection Using Machine Learning
Submitted by grigby1 on Fri, 04/14/2023 - 3:58pm
malware
Workstations
Support vector machines
Resiliency
resilience
pubcrawl
Performance analysis
network security
Metrics
analysis
machine learning
Instruments
detection techniques
Compositionality
composability
botnets security
botnet
biblio
Systematic review of automatic translation of high-level security policy into firewall rules
Submitted by aekwall on Fri, 01/13/2023 - 3:53pm
Human Factors
performance evaluation
network security
pubcrawl
Scalability
Metrics
Resiliency
Systematics
telecommunication traffic
Workstations
Firewalls (computing)
security policy
Natural languages
Ontologies
security policies
firewall
biblio
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Submitted by grigby1 on Fri, 01/06/2023 - 3:59pm
Network
SATA
leakage
electromagnetic
Workstations
radio transmitters
air-gap
exfiltration
Air gaps
covert channels
pubcrawl
Virtual machining
composability
Computers
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
Human behavior
biblio
About the System of Profiling User Actions Based on the Behavior Model
Submitted by grigby1 on Thu, 10/20/2022 - 3:16pm
Windows Operating System Security
UBA
profiling
internal attacker
behavior analysis
Resiliency
Workstations
File systems
service-oriented architecture
pubcrawl
operating systems
control systems
composability
Prototypes
Access Control
resilience
Metrics
biblio
Fleet Management System for Autonomous Mobile Robots in Secure Shop-floor Environments
Submitted by grigby1 on Thu, 02/03/2022 - 4:09pm
collaboration
security
pubcrawl
policy-based governance
resilience
Resiliency
Dynamic scheduling
Loading
Human Factors
Service robots
mobile robots
Workstations
Production facilities
robot operating systems security
biblio
Endpoint Cloud Terminal as an Approach to Secure the Use of an Enterprise Private Cloud
Submitted by grigby1 on Thu, 09/16/2021 - 4:07pm
Metrics
Workstations
Virtualization
Software
SoC
security
Scientific Computing Security
Resiliency
resilience
pubcrawl
cloud
KVM
information security
Hardware
endpoint cloud terminal
Employment
computer security
Compositionality
Cloud Computing
biblio
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
Submitted by aekwall on Tue, 08/31/2021 - 11:42am
composability
Crypto-Ransomware
Cryptography
Cybersecurity
encryption
IP networks
Metrics
operating systems
pubcrawl
Ransomware
Ransomware Analysis
Resiliency
telecommunication traffic
Workstations
biblio
Generation and Distribution Secret Encryption Keys with Parameter
Submitted by grigby1 on Tue, 05/25/2021 - 3:22pm
Human Factors
Workstations
Scalability
Resilient
resilience
Reliability
registration center
public key cryptography
Public key
pubcrawl
Prototypes
parametric algebra
multiplication
Metrics
algebra
Human behavior
exponential
excitation
encryption
distributing
discrete logarithm
cryptosystem
cryptology
cryptographic key
composability
Communication channels
collaboration
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
physical objects
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
intrusion detection system
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
cyber-attacks
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
active querying
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
1
2
3
next ›
last »