Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data leakage
biblio
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
privacy policy enforcement
taint analysis
Smalien enforced privacy policy
implicit information flows
implicit information flow
IIFs
IIF-contained information
IIF-accompanied attacks
IIF tricks
IIF detection technique
explicit information
dynamic taint analysis technique
dynamic taint analysis
DTA technique
Android applications
security of data
Android (operating system)
android
Instruments
data leakage
Metrics
privacy
composability
pubcrawl
mobile computing
performance evaluation
security
Runtime
data privacy
Servers
biblio
Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat
Submitted by grigby1 on Tue, 01/21/2020 - 11:22am
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
insider threat
Human behavior
Endpoint protection platform
Endpoint protection
Endpoint detection and response
data leakage
Data Breach
collaboration
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by aekwall on Mon, 06/10/2019 - 10:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting
Submitted by grigby1 on Wed, 11/28/2018 - 2:08pm
Anomaly Detection
Application Fingerprinting
composability
cyber physical systems
Data Exfiltration
data leakage
False Data Detection
Human behavior
network security
pubcrawl
resilience
Resiliency
biblio
Study on Data Security Policy Based on Cloud Storage
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
Data models
user data security risk analysis
storage management
Servers
security policy
security of data
Secure storage
pubcrawl
network storage technology
data security policy
Data Security
Cloud Computing
data leakage
Cryptography
Computational modeling
computational intelligence
Compositionality
composability
cloud storage system structural characteristics
cloud storage security policy
cloud storage
cloud computing environment
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
« first
‹ previous
1
2