Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Incident Response
biblio
Ransomware Prevention System Design based on File Symbolic Linking Honeypots
Submitted by aekwall on Thu, 07/14/2022 - 3:19pm
Incident Response
threat
ransomware preventive measures
ransomware detection
decryption
data acquisition
File systems
pubcrawl
Cybersecurity
system analysis and design
Measurement
information security
Ransomware
composability
Resiliency
Metrics
encryption
Conferences
collaboration
biblio
Digital Forensics and Incident Response (DFIR) Challenges in IoT Platforms
Submitted by grigby1 on Mon, 06/06/2022 - 11:14am
Scalability
DFIR
Resiliency
best practices
Task Analysis
Metrics
computer security
standards
IoT security
Internet of Things
Hardware
resilience
Human behavior
pubcrawl
IoT
Incident Response
Digital Forensics
biblio
Analysis of the attack vectors used by threat actors during the pandemic
Submitted by grigby1 on Thu, 05/13/2021 - 11:21am
Incident Response
threat actor
security
Scalability
Resiliency
resilience
pubcrawl
Pandemics
Organizations
malware
information security
threat vectors
Human behavior
Cyber Kill Chain
COVID-19
computer security
business continuity
Attack vectors
attack vector
analysis
privacy
Measurement
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Detecting Adversary using Windows Digital Artifacts
Submitted by grigby1 on Fri, 04/17/2020 - 10:27am
microsoft windows
XTEC
Windows operating systems
Windows Operating System Security
Windows digital artifacts
third-party sensors
Task Analysis
Shimcache
sensors
security of data
Resiliency
resilience
pubcrawl
Prefetching
Microsoft Windows (operating systems)
advanced persistent threat
Metrics
malicious behaviors
machine learning
learning (artificial intelligence)
Incident Response
History
Forensics Investigation
file execution
estimation
composability
APT
application compatibility cache
adversary detection
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
object behaviour
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
data collection capabilities
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
Bluetooth
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
IoT
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management
Submitted by BrandonB on Wed, 05/06/2015 - 9:39am
best practices
Companies
Computer crime
Cybercrime
economic feasibility
enterprise IT security experts
Forensics
Incident Response
incident response management
IT security
malware
remediation
small and medium sized enterprises
small-to-medium enterprises
SME