Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
A model for the design of next generation e-supply chain digital forensic readiness tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
Filtering
trading partners
supply chain management
Software
pubcrawl170109
Next generation networking
network forensics
Monitoring tools
Monitoring
internet
information and communications technology
ICT
Forensics domains
Business
eSC environment
electronic supply chain
electronic commerce
e-Supply Chains (eSCs)
e-supply chain
Digital Forensics
digital forensic readiness tools
Digital forensic readiness (DFR)
Digital forensic Investigation (DFI)
Digital forensic data analysis tools
Cybercrime
cyber-crime
biblio
A simulated criminal attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
a simulated criminal attack
advanced attack
branch office attack exercise
branch office attack plan
Computer crime
firewalls
head office attack exercise
head office attack plan
on-site reconnaissance
pubcrawl170109
Red Team exercise
remote information gathering
spear phishing exercise
spear phishing plan
threat analysis
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
security
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
Internet fraud
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
financial crime
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
Anti-money Laundering
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Cyber-deception and attribution in capture-the-flag exercises
Submitted by grigby1 on Tue, 03/07/2017 - 1:35pm
DEFCON CTF exercise data
Training
Support vector machines
Social network services
security of data
pubcrawl170109
Payloads
pattern classification
Logistics
capture-the-flag exercises
DEFCON capture-the-flag exercise data
Decision trees
Cyber-security
cyber-deception
cyber-attack
culprit attribution
Computer crime
classification techniques
biblio
Self-triggered coordination over a shared network under Denial-of-Service
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Clocks
Computer crime
computer network security
cyber-physical systems
denial-of-service attacks
DoS attacks
DoS frequency
Jamming
network agents
persistency-of-communication
PoC
pubcrawl170109
self-triggered coordination
shared network
Time-frequency Analysis
Topology
biblio
DC scanner: Detecting phishing attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
hypermedia markup languages
who is command
Web pages
visualization
URL verification
Servers
Script scanning
script codes
pubcrawl170109
phishing attack probability
internet
Computer crime
HTML contents
Electronic mail
e-mail based phishing attack detection
domain related authority details
domain name
DC scanner
Data mining
data analysis
cyber-attacks
Content analysis
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »