Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Exploring the Dark Web for Cyber Threat Intelligence Using Machine Leaning
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
Doc2Vec
tools
Resiliency
resilience
pubcrawl
privacy
natural language processing
malware
machine learning
machine leaning
learning (artificial intelligence)
intelligence
information security
artificial intelligence security
Data models
darkweb
dark web
cyberattack
cyber threat intelligence
cyber intelligence
Cyber Attacks
cyber attack techniques
counter measure
Computer crime
composability
biblio
Developing Battery of Vulnerability Tests for Industrial Control Systems
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Integrated circuit modeling
vulnerability tests
test environment
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
intrusion prevention systems
Intrusion Detection Systems
Intrusion Detection
Industrial Control Systems Anomaly Detection
information security
Industrial Control Systems
industrial control
Industrial Communication
IEC standards
ICS/IDS systems
ICS networks
ICS area
data generator
control engineering computing
connected environment
computer network security
attack vector
biblio
Mitigating Content Poisoning in Content Centric Network: A Lightweight Approach
Submitted by grigby1 on Tue, 01/21/2020 - 11:28am
data dissemination
digital signatures
Information Centric Network
Information Centric Networks
information security
network architecture
pubcrawl
publish-subscribe systems
resilience
Resiliency
Scalability
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Research on Protection for the Database Security Based on the Cloud of Smart Grid
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
information security
state grid
smart power grids
Smart Grid
sensitive data encryption
security of data
safety protection
Resiliency
pubcrawl
production data desensitization
Predictive Metrics
power engineering computing
Internet market
internet
information security assurance
Big Data
encryption audits
database security audit technology
database management systems
database firewall technology
Data Security
Cryptography
Compositionality
cloud services
cloud security issues
cloud environment
cloud database security protection
cloud database security
Cloud Computing
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
information security
actuator security
Time series analysis
multidimensional time series values prediction
multidimensional time series
information security breaches detection
distributed control systems
distributed control
data prediction
control system security
actuator data
time series
Kernel
control engineering computing
sensor data
process control
network attacks
convolutional neural networks
Training
Metrics
composability
pubcrawl
Human behavior
Resiliency
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »