Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
Multi-scale wavelet kernel extreme learning machine for EEG feature classification
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
learning (artificial intelligence)
wavelet transforms
Training
Support vector machines
signal classification
pubcrawl170109
multiscale wavelet kernel extreme learning machine classifier
multi-scale wavelet kernel
medical signal processing
Accuracy
Kernel
feature extraction
ELM
electroencephalography
electroencephalographic signal feature classification
EEG feature classification
EEG classification
Classification algorithms
biblio
Prioritization of MTTC-based combinatorial evaluation for hypothesized substations outages
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
power system reliability
Topology
Substations
substation ranking
substation protection
S-select-k problem
risk management
risk indices
Reliability
randomly generated mean-time-to-compromise value
pubcrawl170109
combinatorial mathematics
power generation reliability
MTTC-based combinatorial evaluation prioritization
mean time to compromise (MTTC)
Indexes
IEEE standards
IEEE 30-bus system
hypothesized substation outage
cyber-contingency analysis
Computer crime
Combinatorial verification
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
Teaching and Training Cybersecurity as a Cloud Service
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
GenCyber camps
virtualization technologies
Virtualization
virtualisation
virtual cybersecurity experiments
virtual cloud services
Servers
security of data
pubcrawl170109
Protocols
Network interfaces
IT infrastructures
IoT
Internet of Things
Internet connectivity
graduate students
and cloud computing
educational courses
education
cybersecurity training
cybersecurity teaching
cybersecurity lab as a service
cybersecurity experiments
cyber resources
computer science education
Computer crime
computer aided instruction
cloud service
cloud computing systems
Cloud Computing
CLaaS
biblio
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
intrusion detection dataset toolkit
user defined synthetic attacks
telecommunication traffic
security of data
pubcrawl170109
Ports (Computers)
network traffic
network attacks
labeled dataset creation
IP networks
Intrusion Detection Systems
Computer crime
Intrusion Detection
IDS
ID2T
Entropy
DIY dataset creation toolkit
defense tool
Data visualization
data visualisation
Data mining
cyber-attacks
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »