Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
Face Verification and Recognition for Digital Forensics and Information Security
Submitted by grigby1 on Wed, 06/03/2020 - 11:02am
Forensics
verification methods
surveillance
security
Scalability
Resiliency
resilience
pubcrawl
MULTIFORESEE
Metrics
learning (artificial intelligence)
information security
information forensics
Human Factors
Human behavior
CNN
FOREnsic SciEnce Evidence
facial landmarks
face verification setup
Face Verification
face recognition
European COST Action MULTImodal Imaging
Digital Forensics
deep learning approaches
deep learning
data acquisition process
data acquisition
convolutional neural networks
convolutional neural nets
CNN models
biblio
Digital Forensics: Focusing on Image Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 11:01am
image components
Scalability
Resiliency
resilience
pubcrawl
processing
Metrics
investigations
information forensics
images branch
Image forensics
cyber
image
Human Factors
Human behavior
Forensics
electronic thieves
digital investigators
Digital Forensics
digital devices
digital
biblio
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
pubcrawl
internet
live data forensics
Metrics
microsoft windows
Microsoft Windows (operating systems)
online front-ends
open source tool
postmortem analysis
Forensics
public domain software
Public key
resilience
Resiliency
Web Wallets
Windows Operating System Security
Windows systems
automated forensic process
forensic traces
forensic research
forensic acquisition
Digital Forensics
Cryptographic Hash Function
cryptocurrency forensics
cryptocurrencies
Computer crime
composability
Browsers
bitcoin web wallet
Bitcoin forensics
Bitcoin clients
bitcoin
automated live forensic
biblio
An efficient modular security plane AM-SecP for hybrid distributed SDN
Submitted by grigby1 on Wed, 03/18/2020 - 10:58am
SDN layers which ease packets inspections
Internet service providers
invasive software
malwares
mobile operators
pubcrawl
resilience
Resiliency
Scalability
SDN
internet
SDN security
SDN's security issues
SDNs
security
security of data
Servers
software defined networking
technical challenges
telecommunication traffic
detecting intrusions
centralized network architecture
centralized security layer
computer architecture
Computer crime
computer network security
Conferences
control planes
data plane
denying services
AM-SecP
distributed systems
DoS/DDoS
efficient modular security plane AM-SecP
end user layer
Firewalls (computing)
flexibility
Forensics
hybrid distributed SDN
biblio
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Database Security
causality
centralised vector-clock architecture
chain of custody
chain of custody properties
CoC properties
commercial database systems
database audit
database audit records
auditing capabilities
digital evidence
forensically-aware distributed database architecture
hybrid logical clocks
role segregation
third-party verification
transactional databases
user transactions
Security Audits
Provenance
computer architecture
Resiliency
Human behavior
pubcrawl
Distributed databases
Forensics
Digital Forensics
Data mining
security
Proposals
database forensics
database management systems
Scalability
Clocks
auditing
action accountability
admissible audit records
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
Maritime Situational Awareness Forensics Tools for a Common Information Sharing Environment (CISE)
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
National security
information management
integrated systems laboratory
ISL
learning (artificial intelligence)
marine engineering
maritime security
Maritime Surveillance
maritime surveillance systems
maritime traffic
Metrics
MS
Hellenic CISE
National Situational Picture Management system
NSPM system
pubcrawl
resilience
Resiliency
security of data
situational awareness
surveillance
time filtering
tools
corresponding national legacy systems
AIS
Artificial Intelligence
automatic identification system
C2I system
CISE
Command
command and control systems
common information sharing environment
composability
control
control-command-information system
AI
CY-CISE projects
Cypriot CISE
Databases
deep learning
Distributed CISE database
EU Member States
Europe
Forensics
forensics tools
fusion algorithms
biblio
Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Submitted by grigby1 on Tue, 10/15/2019 - 1:44pm
biometric
composability
computer security
Forensics
Human behavior
keystroke
Metrics
Pattern recognition
pubcrawl
Repudiation
resilience
Resiliency
user authentication
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Denial of Engineering Operations Attacks in Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
Resiliency
Human behavior
pubcrawl
composability
disassembler
Forensics
industrial control system
ladder logic
PLC
protocol reverse engineering
SCADA
SCADA Systems Security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »