Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phishing
biblio
Flubot Malware Hybrid Analysis on Android Operating System
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
Phishing
telecommunication traffic
static analysis
source coding
Servers
Resiliency
resilience
pubcrawl
privacy
Android malware
operating systems
Metrics
Malware Analysis
Hybrid Analysis
Human behavior
flubot malware
computer viruses
biblio
Analysis of Cyber Security Attacks using Kali Linux
Submitted by grigby1 on Fri, 06/09/2023 - 12:13pm
Internet of Things
security
pubcrawl
resilience
Safety
Cybersecurity
Wireless communication
Linux
Phishing
Uniform resource locators
Kali Linux
cyber-attacks
COVID-19
Resiliency
Cybersecurity Damage Assessment
biblio
Detection of web attacks using machine learning based URL classification techniques
Submitted by grigby1 on Thu, 05/11/2023 - 3:49pm
Uniform resource locators
uniform resource locator
path traversal
Cross Site Scripting
command injection
Malicious URL
SQL injection
Resiliency
command injection attacks
cyber security
Systematics
deep learning
Phishing
Classification algorithms
composability
privacy
resilience
Metrics
pubcrawl
machine learning
feature extraction
biblio
SOAP messaging to provide quality of protection through Kerberos Authentication
Submitted by grigby1 on Fri, 03/03/2023 - 4:16pm
Phishing
kerberos security
Kerberos authentication
passwords
Retina
web security
XML
service oriented architecture
Multi-factor authentication
pubcrawl
SOAP
Protocols
web services
authentication
Resiliency
resilience
Metrics
Human behavior
biblio
Importance of Cyber Security in Software Quality Assurance
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
Phishing
software quality assurance
software quality
software engineering
software assurance
Scalability
Resiliency
resilience
pubcrawl
Information Assurance
Penetration Testing
malware
machine learning
Industries
data integrity
cyber security
cryptocurrency
code review
biblio
Analysis of Twitter Spam Detection Using Machine Learning Approach
Submitted by grigby1 on Fri, 02/17/2023 - 4:38pm
social networking (online)
spam filtering
Phishing
internet
Scalability
Filtering
Metrics
Human behavior
pubcrawl
Servers
Support vector machines
spam detection Twitter spam
OSN spam
spam detection
Blogs
biblio
Analysing the Impact of Cyber-Threat to ICS and SCADA Systems
Submitted by grigby1 on Fri, 02/17/2023 - 4:13pm
Training
pubcrawl
resilience
Resiliency
integrated circuits
SCADA systems
Computers
malware
Compositionality
Phishing
Market research
Attack vectors
automation
APTs
SCADA Systems Security
ICS/SCADA
biblio
Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities
Submitted by grigby1 on Fri, 02/17/2023 - 4:11pm
Phishing
email server
Email gateway
policy governance
sandbox
sandboxing
malware
Telecommunications
Electronic mail
Logic gates
Trojan horses
composability
pubcrawl
Servers
Organizations
Engines
collaboration
biblio
Advanced Analysis of Email Sender Spoofing Attack and Related Security Problems
Submitted by grigby1 on Mon, 02/13/2023 - 1:59pm
Mail spoofing attack
Social engineering attack
Sender source security check
security
Scalable Security
Scalability
pubcrawl
Phishing
Mail spoofing detection method
scalable verification
Image edge detection
Email ecosystem
Electronic mail
Ecosystems
Conferences
Cloud Computing
Anti-Spam
biblio
Comparative Study of Classification Algorithms for Website Phishing Detection on Multiple Datasets
Submitted by grigby1 on Fri, 02/03/2023 - 4:24pm
Computer hacking
information security
machine learning algorithms
Support vector machines
cyber security
Neural networks
pubcrawl
Human behavior
Artificial Intelligence
Classification algorithms
Phishing
Seminars
Phishing Detection
phishing attacks
Phishing Classification
1
2
3
4
5
6
7
8
9
…
next ›
last »