Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Portable document format
biblio
PDF Malware Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 10:49am
privacy
Virtual machining
static analysis
Shell Scripting
security
ScriptAnalysis
Resiliency
resilience
pubcrawl
cuckoo sandbox
Portable document format
PDF malware
Monitoring
Metrics
Malware Analysis
malware
Human behavior
dynamic analysis
biblio
Torsion: Web Reconnaissance using Open Source Intelligence
Submitted by grigby1 on Fri, 06/02/2023 - 4:31pm
pubcrawl
dark web
Human behavior
Human Factors
metadata
onion sites
OSINT
Portable document format
privacy
Reconnaissance
Surge protection
surveillance
Time-frequency Analysis
TORSION
biblio
Capturing Attacker Identity with Biteback Honeypot
Submitted by aekwall on Mon, 03/14/2022 - 1:43pm
Routing
feature extraction
pubcrawl
Resiliency
Routing protocols
Prototypes
Predictive Metrics
Virtual private networks
Portable document format
Biteback
honeypot
metasploit
Meterpreter
reverse TCP
Webcams
Router Systems Security
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 10:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
biblio
E-Government - Qualified Digital Signature Case Study
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
institutional websites
Web sites
security
Resiliency
resilience
qualified digital signature case
Qualified Digital Signature
pubcrawl
Portable document format
policy-based governance
Leiria
Law
Instruments
Autenticity
Human behavior
government data processing
Germanium
Electronic government
E-Government
documentation
digital signatures
digital format
Cybersecurity
computer application
collaboration
biblio
SecureCSearch: Secure Searching in PDF Over Untrusted Cloud Servers
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
Keyword search
Secure File Sharing
resilience
Resiliency
pubcrawl
untrusted cloud servers
specific files
Shamir's Secret Sharing
Shamir Secret Sharing scheme
SecureCSearch
secure searching
Searching
Portable document format
PDF file
PDF
keyword search operations
Cryptography
information retrieval
incurs minimal computation cost
hacks
encrypted shares
encrypted PDF files
encrypted domain
encrypted cloud data
data leakage
cloud
data storage
storage management
Servers
Cloud Computing
security
encryption
biblio
Efficient Exploration of Algorithm in Scholarly Big Data Document
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
document handling
Metadata Discovery Problem
TFIDF
textual content
Steaming
Software algorithms
Sentence Extractor
self-learning
searching algorithms
search engine
scholarly digital documents
scholarly Big Data document
Scholarly big data
Pseudo codes
Portable document format
indexing
Scalability
AlgorithmSeer
Algorithms
algorithm representations
algorithm indexing
algorithm database
search engines
Data mining
metadata
internet
composability
pubcrawl
Resiliency
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
FP-STALKER: Tracking Browser Fingerprint Evolutions
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
online front-ends
target tracking
Portable document format
FP-STALKER approach
browser instances
Resiliency
Compositionality
Browser Security
Fingerprint recognition
Browser Fingerprinting
privacy
microsoft windows
Browsers
learning (artificial intelligence)
Metrics
Human behavior
pubcrawl
resilience
security
data privacy
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
1
2
next ›
last »