Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
law enforcement
biblio
Blockchain explorer: An analytical process and investigation environment for bitcoin
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Online banking
illicit trades
innovative decentralized architecture
invasive software
law administration
law enforcement
law enforcement investigation
law enforcement local environment
malware modus operandi
marketcap
illegal trades
pseudo anonymity
pubcrawl
Public key
Ransomware
real-time systems
Scalability
Training
USD
darknet marketplaces
bitcoin protocol network
bitcoin security
blockchain
blockchain explorer
Computer crime
computer network security
crime instances
cryptocurrency
Cryptographic Protocols
bitcoin analytical process
DDoS extortion
distributed ledger
financial data processing
graphical transaction relation
History
Human behavior
human factor
Human Factors
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems
Submitted by grigby1 on Wed, 08/02/2017 - 1:17pm
and penal law
collaboration
Cybersecurity
E-Government
effectivity
efficiency
Electronic government
Government
Human behavior
law enforcement
legal design
open justice
Policy
pubcrawl
Resiliency
smart governance
biblio
Managing Emergent Ethical Concerns for Software Engineering in Society
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
citizen science
cyber crime
emergent ethical concern management
ethical aspects
ethics
law enforcement
Media
pubcrawl170109
Societies
society projects
Software
software engineering
software in society
software management
Stakeholders
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 12:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
« first
‹ previous
1
2
3
4