Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security threats
biblio
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
Submitted by grigby1 on Tue, 03/09/2021 - 1:48pm
cyber threat intelligence
security
Scalability
pubcrawl
Organizations
monetary value
market capitalization
Human behavior
financial data processing
exchange breach
Ecosystems
attacks
cyber security threats
cyber security breaches
cyber security
cryptocurrency exchanges
cryptocurrencies
Computer crime
Bitcoin market value
Bitcoin exchange platforms
bitcoin
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 10:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
Resiliency
Korean e-government framework
Korean government agency
Linux
Metrics
military war game modeling
modeling and simulation
pubcrawl
resilience
infringement incident response tool
scenario based infringement incident response training
Secure Coding
virtualisation
virtualization-based infringement incident response tool
vulnerability measure practice
Window operating system environments
Windows Operating System Security
actual information system
government data processing
defense practice
cyber security training system
cyber security threats
cyber security experts
cyber security
computer science education
Computer crime
computer based training
composability
Cloud Computing
cloud
CBT type remote education
artificial intelligence technology
artificial intelligenc
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 2:21pm
Indexes
wireless access points
vulnerabilities
Smart Sensor
Smart Grid Sensors
Smart Grid
smart cities
Servers
Sensor Systems
security of data
Resiliency
pubcrawl
process algorithm
physical object
local real-time control activities
Intelligent sensors
Cloud Computing
Humidity
Human Factors
Human behavior
enterprise command
Data collection
cyber-physical systems
cyber security threats
cyber security
cyber physical sensors system security
cyber physical SENSOR Systems
Cryptography
CPSS threats
control center
computing platform
composability
biblio
Extracting Cyber Threat Intelligence from Hacker Forums: Support Vector Machines versus Convolutional Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
learning (artificial intelligence)
vital information
threat vectors
text classification
Support vector machines
relevant threat intelligence
relevant threat information
pubcrawl
privacy
pattern classification
Open-Source Intelligence
Metrics
machine learning
Learning systems
Computer crime
hacker forums
hacker forum
feedforward neural nets
error-prone process
Data mining
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security threats
cyber security
convolutional neural networks
Convolutional Neural Network algorithms
Computer hacking
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor