Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybercrime
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 3:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
malware
malicious mining
cryptojacking
behavioral analysis
Multicore processing
Ransomware
Cybercrime
Browsers
malware detection
Monitoring
Libraries
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
law enforcement interventions
social networking (online)
Reddit forums
qualitative evaluation
qualitative analysis
qualitative
pubcrawl
Policy
Operation Hyperion
Operation Bayonet
law-enforcement
Cybercrime
law administration
internet
Human Factors
Human behavior
forum users
drug-markets
DNM ecosystem
dark-web
dark web
Dark Net Market users
biblio
Digital Forensics: Maintaining Chain of Custody Using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Human behavior
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
participants
Metrics
legislation
Law
information forensics
hyperledger composer
Human Factors
assets
encryption
distributed ledger
Distributed databases
Digital Forensics
digital evidence
Cybercrime
Cryptography
Conferences
Computer crime
chain of custody maintenance
chain of custody
blockchain
Base64
biblio
How to hack the hackers: The human side of cybercrime
Submitted by willirn1 on Tue, 09/24/2019 - 3:50pm
Cognitive Security
Cognitive Security in Cyber
hackers
Hacking
Cybercrime
« first
‹ previous
1
2
3
4
next ›
last »