Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyberspace
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 9:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 10:14am
security event database
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
intelligent cyberspace defense architecture
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
containerization technology
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
composability
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
machine learning
Viruses (medical)
situational awareness
Resiliency
resilience
relevant network security situation assessment algorithms
quantitative evaluation
qualitative evaluation
pubcrawl
neural network
network security
Metrics
advanced artificial intelligence deep learning technology
learning (artificial intelligence)
Indication System
deep learning
Cyberspace
cyber range network security indication system
cyber range
computer security
computer network security
composability
Artificial Intelligence
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
Terrorism
information technology security
government data processing
cyber security countermeasures
Cyber defence
social aspects of automation
cyber deterrence
Computers
cyber defense
cyber terrorism
security of data
Cyberspace
resilience
Government
Deterrence
internet
pubcrawl
Human behavior
Scalability
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
collateral damage control
nuclear regime
nuclear deterrence versus cyber deterrence
nuclear deterrence
legal norm
international agreement
government policies
cyberwar
cyberattack deterrence
cyber-dependent infrastructure
Critical Infrastructure Protection
comprehensive defense
security of data
Deterrence
Cyberspace
resilience
cyberattack
privacy
pubcrawl
Human behavior
critical infrastructures
cyber security
Scalability
Computer crime
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »