Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
cryptocurrency
victims
malicious scripts
legal mining service
legal mining scripts
in-browser mining activities
in-browser mining
cryptojacking dead
cryptocurrency mining
coinhive shutdown
coinhive scripts
cryptomining
cryptojacking
Data mining
cyberattack
malicious script
Web sites
online front-ends
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
A Comparative Survey on Blockchain Based Self Sovereign Identity System
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Medical services
smart contracts
self sovereign identity
Scalability
Resiliency
resilience
Public key
pubcrawl
privacy
Identity management
internet
Human Factors
Human behavior
honey pots
Honey Pot
Cryptography
blockchain
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
biblio
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment
Submitted by grigby1 on Wed, 02/03/2021 - 1:10pm
Three-dimensional displays
resilience
secure integration
security
sensitive information
shared canvas
third-party context
third-party library providers
third-party sandboxing
rendering (computer graphics)
three-dimensional world
virtual reality
web security
Web technology
WebVR
WebVR environment
WebVR site
hypermedia markup languages
360-degree immersive browsing experiences
Browsers
CanvasMirror
composability
cyber physical systems
HTML canvas
Human behavior
Human Factors
immersive systems
internet
Libraries
Load modeling
Loading
online front-ends
privacy
pubcrawl
biblio
Simulating the Effects of Social Presence on Trust, Privacy Concerns Usage Intentions in Automated Bots for Finance
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
natural language interfaces
consumer trust
finance
financial advisory platforms
financial decisions
financial function
financial management
financial support purposes
financial technology
financially-sensitive information
human-to-human interaction
chatbot vignettes
perceived humanness
reliable chatbot
secure chatbot
social
Social presence
socio-emotional features
socio-emotional support
usage intentions
Vignette Emma
XRO23
chatbot
privacy concerns
Trusted Computing
Human behavior
pubcrawl
privacy
internet
Reliability
Industries
trust
Computers
data privacy
Decision support systems
Banking
User Perception
human trust
Investment
accessible banking
automated bots
automated decision technology
automated decisions
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Humanoid robots
Web technologies
voting process
smart phones
smart phone
Servers
Scalability
Resiliency
resilience
pubcrawl
polling booth
OTP
mobile computing
Mobile Application
Metrics
internet
android encryption
Human behavior
government data processing
fraud voters
fraud
encryption
electronic voting
e-voting system
Cryptography
computer science
casted vote count
biometric
Androids
Android platform
AES256 algorithm
Aes256
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »