Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Toward the SIEM architecture for cloud-based security services
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
intelligent cyber-threat
virtualization technologies
virtualisation
Software Architecture
SIEM architecture
SIEM
security-as-a-service
security of data
security information and event management
SECaaS platform
SECaaS
pubcrawl
Cloud Computing
information security
Engines
Data models
Data mining
Cryptography
Correlation
computational intelligence
Compositionality
composability
cloud-based security service
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
biblio
An Empirical Study on the Effect of Information Security Activities: Focusing on Technology, Institution, and Awareness
Submitted by grigby1 on Thu, 05/24/2018 - 12:32pm
collaboration
Information culture
information protection
information security
Information security breach
Policy
Policy Based Governance
policy-based governance
pubcrawl
biblio
Secure Transmission Protocol for the IoT
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Compositionality
information security
Internet of Thing
Policy
policy-based collaboration
privacy
protocol verification
pubcrawl
transmission protocol
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Timestamp Hiccups: Detecting Manipulated Filesystem Timestamps on NTFS
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
composability
Digital Forensics
filesystem
Information Leakage
information security
Metrics
NTFS
privacy
pubcrawl
Steganography
steganography detection
biblio
A generic framework for information security policy development
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
Law
security policy development
security policy content
security policies
security of data
risk management
replicated policy
pubcrawl
Organizations
maintenance engineering
education
information security policy development process
information security policy
information security policies
information security
improper development process
higher education institutions
generic framework
further education
biblio
Assessment of Vulnerability Severity Using Text Mining
Submitted by grigby1 on Wed, 04/11/2018 - 2:50pm
classification
information security
Metrics
privacy
pubcrawl
software security
Software Vulnerability
Text Mining
threat vectors
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »