Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Honeypot Utilization for Analyzing Cyber Attacks
Submitted by grigby1 on Fri, 09/15/2017 - 9:59am
Hacking
honey pots
Human behavior
information security
network attacks
pubcrawl
Resiliency
Scalability
security breach
biblio
Cyber Security in Governments Around the World: Initiatives and Challenges
Submitted by grigby1 on Wed, 08/02/2017 - 1:16pm
collaboration
cyber security
cyber security initiatives
cyber security policy
Cybersecurity
E-Government
Electronic government
Government
Human behavior
information security
international collaboration
Policy
pubcrawl
Resiliency
biblio
A Scalable Threats Classification Model in Information Systems
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
information security
Network reconnaissance
pubcrawl
Resiliency
security dimension
security perspective
security risk
security threats
threat classification
profile
Thomas Jung
Architectures
Architectures
Defense
Energy
Critical Infrastructure
Wireless Sensing and Actuation
Real-Time Coordination
Resilient Systems
Manufacturing
Science of System Integration
Science of Security
Transportation
CPS Technologies
Foundations
Science Policy
Research Program Overview
cyber security
ethical hacking
information security
Internet of Things (IoT)
Internet of Things security
red teaming
Texas
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 1:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
biblio
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
internet
vulnerable SOHO router detection
vulnerabilities
telecommunication network routing
SOHO routers
Servers
pubcrawl170109
Object recognition
man-in-the-middle attacks
IP networks
Internet of Vulnerable Things
Internet of Things
ASN space
information security
Indian autonomous system number space
domain name space settings
DNS settings
DNS information extraction
DNS Changer
Data mining
consumer grade small scale routers
computer network security
Computer crime
attack patterns
biblio
Modeling Free-form Handwriting Gesture User Authentication for Android Smartphones
Submitted by grigby1 on Tue, 03/07/2017 - 12:09pm
pubcrawl170201
authentication
gesture
information security
model
pubcrawl
Science of Security
shoulder surfing
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »