Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber threats
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 11:57am
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Metrics
Sniffles
situational awareness
security systems
Resiliency
Regular expressions
regular expression processing capability
Regexbench
pubcrawl
performance evaluation
PCRE
pattern matching
composability
Handheld computers
deep packet inspection
decision maker mission completeness
Cybersecurity
cyber threats
cyber situational awareness enhancement
cyber situational awareness
Cyber Operations
computer security
computer network security
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 12:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
Detecting Advanced Persistent Threats Using Fractal Dimension Based Machine Learning Classification
Submitted by grigby1 on Tue, 09/05/2017 - 12:19pm
Human behavior
Scalability
Resiliency
remote trojans
pubcrawl
multifractal
Metrics
malware classification
machine learning
advanced persistent threat
False Data Detection
cyber threats
composability
complexity
collaboration
classification
advanced persistent threats (apt)
advanced persistent threats
biblio
Cyber security analysis using vulnerability assessment and penetration testing
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Penetration Testing
vulnerability assessment and penetration testing techniques
Vulnerability Assessment and Penetration Testing (VAPT)
vulnerability assessment
VAPT
testing
Technological innovation
technical assets
Sql Injection (SQLi)
security patches
security of data
security loopholes
security
Resiliency
pubcrawl
Browsers
Organizations
Market research
Human behavior
hacking activities
date security measurement
cyber-attacks
cyber threats
cyber security awareness
cyber security analysis
cyber security
Cross-site scripting (XSS)
Cross Site Scripting
Conferences
composability
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
« first
‹ previous
1
2
3
4