Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital Forensics
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Databases
preparation and pre-response category
Planning
investigation process model
harmonized DBFI process
design science research methodology
database forensics
database forensic investigation processes
Database forensic investigation
analysis and reconstruction category
acquisition and preservation category
Terminology
information forensics
Adaptation models
digital data
Data models
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
Servers
database management systems
biblio
Building Knowledge Bases for Timestamp Changes Detection Mechanisms in MFT Windows OS
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
information security
Windows Operating System Security
timestamps
Resiliency
resilience
pubcrawl
operating system
Microsoft Windows (operating systems)
MFT Windows Os
MFT
Metrics
master file table
knowledge bases
knowledge based systems
Windows operating system
İNDEX\_ROOT
İNDEX\_ALLOCATION
forensic analysis
file timestamp change detection
file organisation
file operations
feature extraction
Digital Forensics
computer forensic science
composability
\$STANDARDİNFORMATION
\$FILE\_NAME
security
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Analysis of secure data deletion and recovery with common digital forensic tools and procedures
Submitted by aekwall on Mon, 01/11/2021 - 1:29pm
Scalability
pubcrawl
privacy
Digital Forensics
data storage media
secure data deletion
data deletion
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
An Overview of Robot Operating System Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:35pm
operating systems
robot operating systems
ROS security
robot operating system forensics
open source operational environment
digital investigation studies
client-server connection
autonomous technologies
Robot Operating System
Service robots
robot programming
vulnerabilities
Industry 4.0
Robot sensing systems
Forensics
privacy
operating systems (computers)
public domain software
Cyber-security
Industries
data privacy
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
Digital Forensics
security
biblio
Android Malware Family Classification Based on Sensitive Opcode Sequence
Submitted by grigby1 on Thu, 10/29/2020 - 11:09am
malware classification
sensitive semantic feature-sensitive opcode sequence
sensitive opcode
sensitive API
semantic related vector
Semantic
Resiliency
resilience
pubcrawl
privacy
pattern classification
oversampling technique
multiple class classification
mobile computing
Metrics
Android (operating system)
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
Drebin dataset
Digital Forensics
code specific semantic information
application program interfaces
Android malware forensics
Android malware family classification model
Android Malware Detection
Android malware analysis
Android malware
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Smart augmented reality glasses in cybersecurity and forensic education
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
heads-up display devices
teaching
STEM
Smart Augmented-Reality Glasses
smart augmented reality glasses
Scalability
resilience
pubcrawl
privacy
Mobile handsets
learning solutions
learning gaps
learning experiences
Human behavior
high resolution optical head mounted display
helmet mounted displays
augmented reality
Glass
Forensics
forensic education
experimental learning
education
discovery learning
Digital Forensics
cybersecurity theories
cybersecurity education
cybersecurity analysts
Computers
computer security
computer science education
computer aided instruction
characteristics of cybersecurity analysts
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »