Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 10:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
biblio
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit
Submitted by grigby1 on Thu, 12/28/2017 - 12:36pm
Metrics
SoK
security research
security of data
security
Science of Security
Scalability
Resiliency
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Philosophy of Science
collaboration
Mathematical model
Human Factors
Human behavior
history of science
History
historical science
Geometry
Context
connections between research and observable world
computer security
composability
biblio
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Metrics
Trusted Computing
sos
security of data
Security Metrics
Science of Security
science of cyber security
Scalability
risk-based approach
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
policy-based sharing
Ontologies
Attack detection
Measurement
Human Factors
Human behavior
Forensics
data trustworthiness
data driven science
data driven approach
Context
computer security
composability
collaboration
cognition
attack mitigation
biblio
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
predictive security metrics
vulnerable components
vulnerability prediction models
text mining features
Text Mining
text analysis
term frequencies
statistical prediction models
statistical learning machinery
software metrics
security
pubcrawl
principal component analysis
computer security
Predictive models
Open Source Software
Metrics
machine learning
learning (artificial intelligence)
large software projects
Feature Selection
dimensionality reduction technique
Data mining
cross-validation
cross-project prediction experiments
confirmatory factor analysis
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Further refinements to the foundations of cyber zone defense
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
Adaptation models
Biological system modeling
composability
computer security
Hardware
intrusion tolerance
Mathematical model
modeling
Predictive models
pubcrawl
Resiliency
security
simulation
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
biblio
Gamification of internet security by next generation CAPTCHAs
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Human behavior
Turing tests
pubcrawl
Pattern recognition
Next generation networking
machine learning algorithms
Internet security
Informatics
Human Factors
human beings
attacks
Gamification
Games
computer security
composability
captchas
CAPTCHA
bots
Birds
biblio
Efficient distribution of fragmented sensor data for obfuscation
Submitted by grigby1 on Wed, 12/20/2017 - 12:01pm
Java
sensor security
sensors
Routing
Prototypes
emulation
Distributed databases
Data fragmentation
computer security
Metrics
Cryptography
composability
obfuscation
Human Factors
Human behavior
Resiliency
pubcrawl
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »