Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider attack
biblio
Network Traffic Analysis for Real-Time Detection of Cyber Attacks
Submitted by grigby1 on Tue, 07/12/2022 - 3:37pm
network traffic
Cyber Dependencies
network forensics
DVWA
Web servers
insider attack
cyberattack
Python
Compositionality
Metrics
real-time systems
Organizations
composability
Standards organizations
telecommunication traffic
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Monitoring
biblio
Insider Attack: Internal Cyber Attack Detection Using Machine Learning
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
Prediction algorithms
Randomized Weighted Majority Algorithm (RWMA)
random forest (RF)
insider attack
Fuzzy Membership Function
Data granularity
machine learning (ML)
insider threat
Transforms
parallel processing
machine learning algorithms
Metrics
Decision trees
composability
Radio frequency
policy-based governance
Human behavior
pubcrawl
Neural networks
cyber security
biblio
Detect Insider Attacks Using CNN in Decentralized Optimization
Submitted by grigby1 on Tue, 11/30/2021 - 2:29pm
pubcrawl
speech processing
simulation
signal processing security
Signal processing algorithms
signal processing
security
Resiliency
resilience
composability
privacy
optimization
Neural networks
Metrics
insider attack
gossip algorithms
distributed optimization
convolutional neural network (CNN)
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Identifying Security Spots for Data Integrity
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
malware
tools
security spots identification
Security spot
security of data
Resiliency
resilience
pubcrawl
program diagnostics
object-oriented programs
object-oriented programming
object oriented security
Metrics
benign code
malicious code
integrity breach conditions
Integrity breach condition
insiders
insider attack
IBCs
Databases
data integrity
Couplings
coupling
composability
biblio
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers
Submitted by grigby1 on Wed, 03/06/2019 - 4:27pm
cloud storage service
users space
store big data
storage management
single cloud storage
Servers
pubcrawl
multiple cloud storage provider
multiple cloud providers
metadata
meta data
local storage
insider attack
data privacy
data owner
Cryptography
Intelligent Data and Security
cloud service
Cloud Security
Cloud Computing
bit data center
big data privacy
big data file
Big Data
authorisation
asymmetric security concept
asymmetric secure storage scheme
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks