Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network threats
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
OT Network
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
internet
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
deep neural networks
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
SCADA Systems Security
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 11:04am
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines