Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Cyber security in smart grid convolution networks (SGCNs)
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Monitoring
Smartgrid Convolution
Smart Grids
smart grid security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Cloud Computing
mitigation
Metrics
Meters
hackers
Fog Computing Security vulnerability
computer security
Cloud Service Delivering
biblio
From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
bitcoin
bitcoin security
blockchain
computer security
Cybersecurity
Human behavior
human factor
Human Factors
Memory
privacy
privacy-protection
pubcrawl
Reliability
Scalability
tamper-proofing
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
A user-centric machine learning framework for cyber security operations center
Submitted by K_Hooper on Wed, 02/14/2018 - 11:00am
Scalability
Mathematical model
Metrics
model performance evaluations
Predictive models
preventive technologies
pubcrawl
Resiliency
risk score generation
risky user detection
malicious attacks
security event normalization
security information and event management system
security of data
SIEM
SOC analyst productivity
Symantec SOC production environment
user-centric
user-centric machine learning framework
flag alerts
computer security
cyber security operation center
cyber security operations center
cyber security practitioners
Data collection
Data models
data scientists
false positive rate reduction
feature engineering
artificial intelligence security
Human behavior
label creation
learning (artificial intelligence)
Learning systems
machine learning algorithm selection
machine learning algorithms
machine learning researchers
machine learning system
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Cyber Terrain Mission Mapping: Tools and Methodologies
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
military computing
tools
situational awareness
sensors
security of data
Resiliency
pubcrawl
Organizations
mission-centric cybersecurity
mission relevant cyber terrain
mission execution
Mission Assurance
composability
Metrics
key terrain cyber
Cyberspace
cyber terrain mission mapping
cyber situational awareness
cyber mission mapping
cyber dependency impact analysis
Cyber Dependencies
cyber assets
computer security
Computational modeling
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Metrics
Sniffles
situational awareness
security systems
Resiliency
Regular expressions
regular expression processing capability
Regexbench
pubcrawl
performance evaluation
PCRE
pattern matching
composability
Handheld computers
deep packet inspection
decision maker mission completeness
Cybersecurity
cyber threats
cyber situational awareness enhancement
cyber situational awareness
Cyber Operations
computer security
computer network security
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour
Submitted by grigby1 on Tue, 02/06/2018 - 1:06pm
Monitoring
user monitoring techniques
user feedback
Usable Security
tools
situational awareness
security of data
Security Awareness
secure online behaviour
Resiliency
pubcrawl
positive behavioural changes
affective feedback
Metrics
human factors of cybersecurity
end-user-security behaviour
End-user security behaviour
education
computer security
composability
Color
categorical information users
categorical behaviour
Avatars
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »