Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
biometric
composability
computer security
Forensics
Human behavior
keystroke
Metrics
Pattern recognition
pubcrawl
Repudiation
resilience
Resiliency
user authentication
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
forward private searchable encryption
Trusted Computing
single client environment
Servers
Resiliency
resilience
pubcrawl
privacy-preserving searches
privacy
forward secure SE schemes
searchable encryption
forward private SE schemes
forward privacy
encryption
encrypted data
data privacy
Cryptography
computer security
composability
biblio
Cyber Deception: Overview and the Road Ahead
Submitted by Katie Dey on Mon, 09/09/2019 - 10:25pm
adaptive cyber defense techniques
adversarial mind manipulation
Cognitive Security
Computer hacking
computer security
cyber attack and defense
cyber deception
Cybersecurity
Cyberspace
moving target defense
primitive systems
proactive cyber defense
proactive strategies
security
security of data
Cognitive Security
Articles for Review
C3E 2019
biblio
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Submitted by grigby1 on Mon, 08/26/2019 - 11:09am
Internet-of-Things
Trusted Computing
service cross-layered system
sensors
security of data
security assessment as a service
SAaaS
Resiliency
resilience
pubcrawl
Monitoring
Medical services
IT healthcare ecosystem
Cloud Computing
Internet of Things
Healthcare
health care
digital-personalised-trusted healthcare
cybersecurity risk
Cybersecurity
cyber threats
cyber aware environment
Cross Layer Security
computer security
composability
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 10:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
Supporting Cyber-Physical Security of Electric Power System by the State Estimation Technique
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
SCADA Systems Security
power system security
power system state estimation
pubcrawl
Reliability
Resiliency
SCADA
SCADA measurement
SCADA systems
power system reliability
security of data
state estimation
state estimation technique
state estimation tool
two-level SE
WAMS
WAMS measurement
composability
power system measurement
power engineering computing
Phasor measurement units
malicious attacks detection
Human behavior
Global Positioning System
EPS
energy system
Electric Power System
data corruption
cyberattacks identification
cyber-physical systems
cyber-physical security
cyber security
computer security
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
biblio
IoT Standardisation: Challenges, Perspectives and Solution
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
computer security
cyber threats
Human behavior
Human Factors
IoT
legislation
privacy
pubcrawl
resilience
Resiliency
Scalability
security audit
Security Audits
standards
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »