Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious insiders
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 3:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Hybrid Technique of Genetic Algorithm and Extended Diffie-Hellman Algorithm used for Intrusion Detection in Cloud
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
genetic algorithm
threat
security of data
Resiliency
resilience
pubcrawl
malicious insiders
Intrusion Detection
insecure APIs
information breaches
hybridization
genetic algorithms
API
Extension in Diffie-Hellman algorithm
extended Diffie-Hellman algorithm
Denial of Services (DOS)
data thrashing
data storage
Compositionality
cloud transmission
Cloud Computing
application programming interface
application program interfaces
APIs
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Evaluating Side Channel Resilience in iPhone 5c Unlock Scenarios
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
iPhone 5c unlock scenarios
EM fault-injection
EM-based iOS studies
Fault injection
intrusion scenarios
iOS Security
iPhone
iPhone 5c model
iPhone 5c processor
electromagnetic fault-injection
locked iOS devices
locked iPhone 5c
malicious insiders
secure operating systems
side channel resilience
side channel vulnerabilities
side channel-based approach
Cryptography
application deployment
law enforcement
operating systems
operating systems (computers)
Compositionality
Metrics
Fingerprint recognition
smart phones
Hardware
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
encryption
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 8:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
1
2
next ›
last »