Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity theft
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
identity protection strategies
Privacy Policies
Stochastic game
protection game
privacy protection system
privacy protection
policy iteration algorithm
policy evaluation
personal identity information
optimal policy
Iterative methods
information dynamic
privacy
evaluation framework
dynamic identity ecosystem approach
Bayesian network mathematical representation
identity theft
Identity Ecosystem
Scalability
data privacy
Human behavior
pubcrawl
security of data
belief networks
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
requirements engineering
uncertainty
software engineering
security threat
security risk
security of data
security decision-making
security
risk management
risk assessment
Risk
Companies
quantitative decision analysis
pubcrawl170109
modelling language
identity theft
decision-making
Decision Making
crime script
crime science
Credit cards
1
2
next ›
last »