Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberattacks
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 5:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Springs
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
protection mechanism
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
Electronic mail
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
adversarial environment
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers
biblio
SDR-Based Resilient Wireless Communications
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
wireless channels
SDR-based resilient wireless communication
security of data
service attacks
session hijacking
software defined radio
Software Defined Radios
software radio
telecommunication security
Scalability
Wireless communication
wireless communications attacks
wireless communications channels
wireless communications secure
wireless networks
wireless protocols
wireless technologies
jamming attacks
Communication system security
Computer crime
cyberattacks
Denial of Service (DoS) Attack
Denial of Service attacks
Frequency modulation
Jamming
jamming attack
Autonomic Security
Metrics
moving target defense
Protocols
pubcrawl
radio channels
Resiliency
Resilient Communication System
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
"Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics"
Submitted by abfox on Tue, 02/14/2017 - 1:25pm
digital forensic practitioner
Random access memory
pubcrawl170101
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
« first
‹ previous
1
2
3