Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
PRIDE: A Privacy-Preserving Decentralised Key Management System
Submitted by aekwall on Fri, 03/03/2023 - 9:52am
blockchain
proofs of knowledge
Privacy-preserving
ERTMS
Rail transportation
Forensics
Europe
key management
Performance analysis
Organizations
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Public key
Conferences
biblio
Network attack detection model based on Linux memory forensics
Submitted by grigby1 on Fri, 03/03/2023 - 8:25am
pubcrawl
Metrics
Resiliency
Analytical models
internet
composability
Memory management
network security
Linux
Compositionality
resilience
Forensics
Memory Forensics
Linux Operating System Security
mechatronics
Linux kernel analysis
biblio
A Framework for SDN Forensic Readiness and Cybersecurity Incident Response
Submitted by grigby1 on Fri, 02/17/2023 - 4:24pm
Telecommunications
SDN Incident Response
SDN Framework
SDN forensics
Evidence
digital forensic
centralized control
Pragmatics
software defined networking
pubcrawl
SDN security
network function virtualization
Forensics
computer security
Scalability
Resiliency
resilience
biblio
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros
Submitted by grigby1 on Fri, 02/17/2023 - 4:11pm
Forensics
Symbolic-Execution
Microsoft-Excel
Malware-Analysis
Computer-Security
obfuscation
policy governance
sandboxing
software reliability
collaboration
malware
static analysis
composability
privacy
Ecosystems
pubcrawl
security
biblio
A Comprehensive Network Security Management in Virtual Private Network Environment
Submitted by grigby1 on Mon, 02/13/2023 - 2:02pm
Organizations
pubcrawl
network security
Scalability
Computers
Forensics
Firewalls (computing)
Gain measurement
Economics
Scalable Security
Digital Forensics
Virtual Private Network (VPN)
biblio
Data Acquisition and extraction on mobile devices-A Review
Submitted by grigby1 on Fri, 01/06/2023 - 2:50pm
android
physical/logical data acquisition
In-System Programming
full disk encryption
File-Base encryption
Combination Firmware
chip-off
mobile device
Digital Forensics
Resiliency
android encryption
Systematics
encryption
Forensics
operating systems
resilience
Data mining
Companies
Scalability
performance evaluation
Metrics
Human behavior
pubcrawl
biblio
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files
Submitted by grigby1 on Fri, 12/23/2022 - 10:55am
feature extraction
machine learning
pubcrawl
Metrics
Resiliency
Conferences
composability
malware
Semantics
Prefetching
Forensics
Windows Operating System Security
malware classification
Malware Analysis
prefetch
biblio
Forensic Analysis of Private Mode Browsing Artifacts in Portable Web Browsers Using Memory Forensics
Submitted by grigby1 on Tue, 12/20/2022 - 6:32pm
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Browsers
Compositionality
Forensics
Web Browser Security
Universal Serial Bus
Intelligent systems
Memory
portable
private mode
Web browser
biblio
Forensic Digital Data Tamper Detection Using Image Steganography and S-Des
Submitted by grigby1 on Thu, 10/20/2022 - 2:59pm
Ciphers
encryption
Internet of Things
pubcrawl
Metrics
privacy
composability
Task Analysis
Forensics
Steganography
Stakeholders
cryptographic
least significant bit
S-DES
steganography detection
biblio
Forensic Analysis of Automotive Controller Area Network Emissions for Problem Resolution
Submitted by aekwall on Fri, 08/26/2022 - 10:57am
Forensics
vehicle
emissions
EMI
electromagnetic compatibility
eavesdropping
fault diagnosis
Magnetic field measurement
Cybersecurity
electromagnetic interference
pubcrawl
cyber-physical systems
controller area network security
CAN
automotive
controller area network
telecommunication traffic
computer security
Internet of Things
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »