Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cybersecurity attacks
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 4:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
biblio
Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Monitoring
Virtualization
standards
software defined networking
security scalability
SDN/NFV-based security features
Scalability
pubcrawl
open-source SDN/NFV projects
authentication
low-cost end-user devices
IoT
Internet of Things
cybersecurity attacks
Conferences
computer network security
Cloud Computing
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime