Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 2:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 10:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
CAPTCHA solvers
welfare-improving CAPTCHA business model
ubiquitous defense
traditional wisdom
open Web resources
Machine Solver
human solvers
Human Solver
Games
game-theoretical analysis
game theoretical framework
equilibrium analysis
cryptocurrency
Complexity theory
cheap labor
CAPTCHA system
security of data
bitcoins
automatic programs
CAPTCHA
captchas
computer security
Economics
Web sites
Computer crime
blockchain
composability
pubcrawl
Human behavior
game theory
Servers
biblio
A Text-Based CAPTCHA Cracking System with Generative Adversarial Networks
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
cDCGAN
text-based CAPTCHA cracking system
text-based CAPTCHA
small sample problem
Pearson correlation coefficients
Multimedia systems
multimedia security mechanism
multimedia computing
generative adversarial networks
Fans
conditional deep convolutional generative adversarial networks
Completely Automated Public Turing Test to Tell Computers and Humans Apart
security of data
CAPTCHA
captchas
convolutional neural networks
computer security
convolutional neural nets
CNN
text analysis
Training
composability
pubcrawl
Human behavior
biblio
A comparison of cyber-security oriented testbeds for IoT-based smart grids
Submitted by aekwall on Mon, 03/18/2019 - 9:55am
pubcrawl
testing
testbeds
smart power grids
Smart Grids
smart grid testbeds
smart grid systems
smart grid security
smart grid practices
smart grid application
Smart Grid
security of data
Scalability
Resiliency
Communications technology
privacy
power engineering computing
Metrics
IoT
Internet of Things
information communication technologies
Hardware
cyber-security oriented testbeds
cyber-attacks
cyber security
conventional power grid system
computer security
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »