Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
qualitative evaluation
biblio
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets
Submitted by grigby1 on Fri, 07/10/2020 - 10:55am
law enforcement interventions
social networking (online)
Reddit forums
qualitative evaluation
qualitative analysis
qualitative
pubcrawl
Policy
Operation Hyperion
Operation Bayonet
law-enforcement
Cybercrime
law administration
internet
Human Factors
Human behavior
forum users
drug-markets
DNM ecosystem
dark-web
dark web
Dark Net Market users
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
machine learning
Viruses (medical)
situational awareness
Resiliency
resilience
relevant network security situation assessment algorithms
quantitative evaluation
qualitative evaluation
pubcrawl
neural network
network security
Metrics
advanced artificial intelligence deep learning technology
learning (artificial intelligence)
Indication System
deep learning
Cyberspace
cyber range network security indication system
cyber range
computer security
computer network security
composability
Artificial Intelligence
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 1:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects