Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks
Submitted by aekwall on Fri, 01/13/2023 - 3:52pm
uncertainty
zero trust security
zero trust
trust evaluation
threshold policy
Partially Observable Markov Decision Processes (POMDP)
security policies
usability
adaptive systems
Human Factors
network security
Decision Making
Resiliency
Metrics
Scalability
pubcrawl
Markov processes
biblio
A System for Interactive Examination of Learned Security Policies
Submitted by aekwall on Fri, 01/13/2023 - 3:51pm
process control
security policies
Probability distribution
POMDP
MDP
Markov Decision Processes
Behavioral sciences
emulation
automation
Software
network security
Reinforcement learning
Resiliency
Metrics
Scalability
pubcrawl
Markov processes
Human Factors
biblio
A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
Firewalls (computing)
Security Audits
security
Scalability
resilience
pubcrawl
network security
network audit
Insurance
Human behavior
Router Systems Security
Databases
control systems
Compliance
Communications technology
blockchains
blockchain
Predictive Metrics
Resiliency
biblio
IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning
Submitted by grigby1 on Fri, 01/13/2023 - 1:28pm
Adaptation models
feature extraction
machine learning
machine learning algorithms
IoT
pubcrawl
resilience
Resiliency
Scalability
Protocols
network security
DDoS
Decision Tree
denial-of-service attack
Security Heuristics
Heuristics
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 12:52pm
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 12:50pm
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
Protocols
Port Security
DHCP Starvation
DHCP Snooping
DHCP Security
DHCP Flooding
dhcp
Security by Default
Integrated optics
Wireless communication
Organizations
Scalability
performance evaluation
network security
Resiliency
resilience
pubcrawl
IP networks
security
biblio
Designing a Framework of an Integrated Network and Security Operation Center: A Convergence Approach
Submitted by grigby1 on Fri, 01/06/2023 - 4:02pm
SQL injection
SoC
PPTGC
NoC
Nervous system
layered framework
Integrated network and security operation center
INSOC
convergence
Pandemics
Air gaps
Organizations
Phishing
network security
composability
process control
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Efficient Public Verification of Confidential Supply-Chain Transactions
Submitted by grigby1 on Thu, 01/05/2023 - 2:28pm
pubcrawl
resilience
Resiliency
Protocols
Production
network security
secret sharing
Sociology
supply chains
Homomorphic encryption
distributed ledger
Pressing
supply chain security
Distributed Ledger Technology
Proxy re-encryption
supply-chain verification
biblio
The Application of 1D-CNN in Microsoft Malware Detection
Submitted by grigby1 on Fri, 12/23/2022 - 11:55am
deep learning
feature extraction
Neural networks
pubcrawl
Metrics
Resiliency
Databases
composability
malware
network security
malware detection
Semantics
Windows Operating System Security
1D-CNN
feature engineering
LightGBM
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »