Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cybercrimes
biblio
Ataques de phishing y cómo prevenirlos Phishing attacks and how to prevent them
Submitted by grigby1 on Fri, 02/03/2023 - 5:23pm
Training
Organizations
pubcrawl
Human behavior
cyber security
Computer crime
computer science
Phishing
cybercrimes
Economics
Globalization
computer attacks
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Digital Forensics Capability Analyzer: A tool to check forensic capability
Submitted by grigby1 on Wed, 06/03/2020 - 12:03pm
analyzer
Computer crime
cost minimization
cybercrimes
digital forensic cell
Digital Forensics
digital forensics capability analyzer
fundamental information
Human behavior
Human Factors
information forensics
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
SDN
malicious virtual machine detection
Memory Analysis
Metrics
privacy
privacy leakage
pubcrawl
resilience
Resiliency
malicious behavior oriented framework
traceability module
virtual machines
Virtual machining
virtualisation
virtualization facility memory evidence extraction
virtualization privacy
volatile data loss problems
full-traffic flow detection technology
cloud-based malicious behavior detection mechanism
composability
Computer crime
cyber crime
cybercrimes
Digital Forensics
digital forensics framework
emergency services
Cloud Computing
Human behavior
Human Factors
IaaS service based forensics module
infection topology
information forensics
law enforcement
malicious behavior
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
Effective Botnet Detection Through Neural Networks on Convolutional Features
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
invasive software
Training
telecommunication traffic
Servers
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Payloads
P2P botnet datasets
Neural networks
Network traffic classification
Metrics
machine learning
learning (artificial intelligence)
IP networks
botnet
internet
feedforward neural nets
feed-forward artificial neural network
feature extraction
DDoS Attacks
cybercrimes
convolutional neural networks
convolutional features
convolution
computer network security
Computer crime
Compositionality
botnets
botnet detection system
Botnet detection
biblio
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
pubcrawl
financial data processing
financial infrastructure
Human behavior
Metrics
Online banking
online fora
privacy
Protocols
erratic cybercrime landscape
Public key
ransom payments
Ransomware
reddit
Resiliency
security
sheep marketplace scam
threat intelligence
Cryptography
bitcoin
Bitcoin ecosystem
Bitcoin Fog
Bitcoin services
BitcoinTalk
BTC-e
composability
Computer crime
auxiliary information
CryptoLocker
CryptoLocker economy
CryptoLocker operation
Cryptolocker ransoms
Cybercrime
cybercrimes
decentralized cryptographic currency
Electronic mail
1
2
next ›
last »