Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
2020 Cybercrime Economic Costs: No Measure No Solution
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Computer crime
cyber security
cyber space
cyber-attacks
cybercrime economic cost
economic costs
Economics
government data processing
Measurement
Organizations
pubcrawl170109
Reliability
security of data
Stakeholders
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
Extracting network connections from Windows 7 64-bit physical memory
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
Network connections
word length 64 bit
Windows 7 physical memory
user interfaces
user credentials
resource management
remote addresses
Random access memory
RAM
pubcrawl170109
Ports (Computers)
port information
Pool Allocations
Physical Memory
network connections extraction
chats
messages
Memory Forensics
memory dump
local IP addresses
Live Forensics
kernel data structures
Forensics
Digital Forensics
data structures
cyber forensics investigation
cyber crime investigation
Conferences
Computers
« first
‹ previous
1
2
3
4
5
6
7