Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat intelligence
biblio
Research on enterprise network security system
Submitted by grigby1 on Fri, 11/25/2022 - 5:47pm
enterprise
Scalability
Science of Security
security
security system
situation assessment
complex systems
composability
computer architecture
computer networks
computer science
threat intelligence
Human behavior
Human Factors
Intrusion Detection
Metrics
network security
Policy Based Governance
pubcrawl
resilience
Resiliency
collaboration
biblio
A Machine Learning based Threat Intelligence Framework for Industrial Control System Network Traffic Indicators of Compromise
Submitted by aekwall on Thu, 06/09/2022 - 11:39am
industrial control
scalable systems
network traffic
IOC
indicators of compromise
ICs
industrial control system
threat intelligence
critical infrastructure
integrated circuits
control systems
Decision trees
telecommunication traffic
Industrial Control Systems
Resiliency
Scalability
pubcrawl
machine learning
biblio
Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
cyber security
pubcrawl
Resiliency
Computational modeling
Computer crime
Ontologies
Compositionality
Semantics
threat intelligence
supply chains
Vocabulary
cyber supply chain
Cyberattack Ontology
Knowledge representation
Information Reuse
biblio
A Network Attack Blocking Scheme Based on Threat Intelligence
Submitted by grigby1 on Tue, 04/19/2022 - 10:45am
pubcrawl
threat intelligence
Support Network Security
signal processing security
signal processing
security
SDN
Resiliency
resilience
real-time systems
Accurate Block
privacy
Metrics
Market research
machine learning
data centers
composability
Communication networks
Cloud Computing
biblio
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection
Submitted by grigby1 on Tue, 04/12/2022 - 12:13pm
Data collection
cyber security
pubcrawl
Human behavior
Databases
malware
Market research
Internet of Things
botnet
threat intelligence
Crawlers
dark web
social computing
biblio
Quantitative metrics characterizing malicious samples
Submitted by aekwall on Tue, 02/22/2022 - 2:16pm
Measurement and Metrics Testing
vulnerability metric
threat intelligence
Time measurement
Market research
Planning
Time series analysis
malware
Metrics
pubcrawl
Analytical models
Data models
Measurement
biblio
Artificial Intelligence Based Security Orchestration, Automation and Response System
Submitted by grigby1 on Mon, 01/10/2022 - 4:55pm
Planning
threat intelligence
Security Orchestration Automation and Response
security information and event management
security
Resiliency
resilience
pubcrawl
privacy preservation
Artificial Intelligence
Metrics
Human behavior
Home appliances
Focusing
Firewalls (computing)
composability
automation
artificial intelligence security
biblio
Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process
Submitted by aekwall on Mon, 11/08/2021 - 3:15pm
Task Analysis
visualization
tools
Analytical models
pubcrawl
Metrics
Resiliency
Human behavior
computer security
cyber security
Data visualization
visual analytics
threat intelligence
threat mitigation
biblio
Deep Learning for Threat Actor Attribution from Threat Reports
Submitted by aekwall on Thu, 05/13/2021 - 11:47am
malware
Task Analysis
Data models
Human behavior
pubcrawl
composability
deep learning
classification
Metrics
Training
attribution
threat intelligence
signal processing
Semantics
threat actor
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
1
2
3
next ›
last »