Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
targeted attacks
biblio
Analyzing Metadata in PDF Files Published by Police Agencies in Japan
Submitted by grigby1 on Thu, 06/22/2023 - 3:14pm
software reliability
sanitization
PDF files
Open Data
Resiliency
law enforcement
targeted attacks
Data Sanitization
software quality
hidden data
computer architecture
Compositionality
component
metadata
composability
resilience
pubcrawl
security
Organizations
biblio
Attacking Key Management in Ransomware
Submitted by grigby1 on Wed, 03/17/2021 - 11:43am
pubcrawl
targeted attacks
steady growth
Scalability
Resiliency
resilience
real-world ransomware
ransomware kill chain
Ransomware
public sector entities
public key cryptography
Public key
attacking key management
private sector entities
opportunistic attackers
NIST
memory attacks
invasive software
extracted keys
encryption
dynamically extracting decryption keys
concerning trends
Computer crime
Chained Attacks
biblio
Adversarial Video Captioning
Submitted by grigby1 on Fri, 07/03/2020 - 12:15pm
targeted attacks
adversarial video captioning
cosine similarity
deep learning models
image captioning attack
image captioning attacks
image domain
Streaming media
target captions
targeted
adversarial machine learning techniques
video captioning
video captioning model
video captioning task
video domain
video playback quality
video stream
video streaming
deep video
machine learning
Scalability
computer architecture
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Force
learning (artificial intelligence)
security of data
deep learning
optimization
computer vision
Perturbation methods
video signal processing
adversarial
adversarial attack
Adversarial Machine Learning
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 2:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 1:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
Testbed for security orchestration in a network function virtualization environment
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
normal network traffic
virtualisation
virtual reality
testbed implementation
telecommunication traffic
telecommunication security
targeted attacks
security orchestration
security of data
Scalability
responses
Resiliency
quality of service
pubcrawl
orchestrate virtualized network functions
machine learning
network quality of service
network function virtualization environment
network function virtualization
Metrics
learning (artificial intelligence)
intelligent response
Human behavior
DDoS
Conferences
computer network security
Computer crime
Cloud Computing
artificial intelligence security
adverse network conditions
biblio
TAON: An Ontology-based Approach to Mitigating Targeted Attacks
Submitted by grigby1 on Tue, 09/05/2017 - 12:20pm
advanced persistent threat
advanced persistent threats
behavioral data
collaboration
composability
Human behavior
Metrics
Ontology
pubcrawl
Resiliency
Scalability
targeted attacks
threat model
1
2
next ›
last »