Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA
Submitted by aekwall on Thu, 05/13/2021 - 10:49am
Electronic mail
Human behavior
pubcrawl
composability
Metrics
Sociology
Statistics
Cybersecurity
Companies
computer security
attribution
Biological system modeling
Blame Attribution
risk communication
biblio
Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Submitted by aekwall on Thu, 05/13/2021 - 10:37am
automotive security
threat mitigation and resilience
threat analysis and risk assessment (TARA)
ISO/SAE 21434
ISO 15118
cybersecurity engineering
connected car
Autosar
attack feasibility rating
attack surface
Surface treatment
automobiles
Scalability
risk analysis
computer security
risk management
Metrics
pubcrawl
Resiliency
road vehicles
Automotive engineering
biblio
Nontransitive Security Types for Coarse-grained Information Flow Control
Submitted by grigby1 on Thu, 04/29/2021 - 1:16pm
Labeling
type systems
Software
security types
security policies
policy-based governance
noninterference
Lattices
language-based security
object oriented security
Information Flow Control
History
computer security
Computer languages
pubcrawl
Metrics
composability
Resiliency
biblio
Cybersecurity and Data Privacy in the Cloudlet for Preliminary Healthcare Big Data Analytics
Submitted by grigby1 on Tue, 04/27/2021 - 1:46pm
Industries
wireless body area network
wireless biosensor network
security
pubcrawl
Mobile handsets
mobile edge cloud
Medical services
medical big data analytics
Big Data
data privacy
cybersecurity and data privacy
computer security
cloudlet
Cloud Computing
cloud
big data security in the cloud
biblio
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis
Submitted by grigby1 on Tue, 04/27/2021 - 1:40pm
Measurement
Semantics
security
Scalability
Resiliency
resilience
Reinforcement learning
pubcrawl
Metrics
Malware Analysis
malware
machine learning algorithms
Knowledge graphs
Cybersecurity
computer security
Big Data
Artificial Intelligence
graph theory
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 12:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 3:54pm
computer networks
Systems engineering education
SEnSE
insider threats detection
insider threat sense
hierarchy-mapping based insider threats model
Fellows
Electronic equipment
active defense model
Systems engineering and theory
detection
model
computer science education
insider threat
Metrics
computer security
Information systems
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
information security
security of data
biblio
High-Performance Monitoring Sensors for Home Computer Users Security Profiling
Submitted by grigby1 on Tue, 03/30/2021 - 11:05am
Monitoring
user security profile
User profiling
user privacy
user modelling
software agents
sensors
security profile
security
Risky Behaviours
Real-time User Behaviour Monitoring
real-time systems
Python
pubcrawl
privacy
computer security
machine learning
learning (artificial intelligence)
Implicit Modeling
Human Factors
human computer interaction
Human behavior
home computing
home computer users security profiling
High-Performance Sensors
high-performance monitoring sensors
high-performance intelligent agent
decision making model
Decision Making
Cybersecurity
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »