Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
Building Forensics in: Supporting the Investigation of Digital Criminal Activities (Invited Talk)
Submitted by K_Hooper on Wed, 05/09/2018 - 10:02am
Forensics
pubcrawl
Resiliency
Scalability
security
Security Heuristics
software engineering
biblio
Secure Lightweight Context-Driven Data Logging for Bodyworn Sensing Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
Scalability
medical domain
Medical services
Monitoring
privacy
pubcrawl
recording
resilience
Resiliency
Medical diagnostic imaging
secure lightweight context-driven data logging
sensor medical data storage
sensor placement
sensors
timestamping
wearable technology
wearables security
Biomedical monitoring
medical computing
Logic gates
localization
Human behavior
Forensics
Digital Forensics
data structures
data handling
data fingerprint storage
contextual information security
chronological epoch-level blocks
bodyworn sensing devices
body sensor networks
Bloom filters
blockchain
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 11:51am
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 12:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
Authorship Attribution for Social Media Forensics
Submitted by grigby1 on Mon, 03/19/2018 - 12:38pm
social networking (online)
multimodal data processing
prepaid SIM cards
pubcrawl
public Wi-Fi hotspots
smart phones
Smartphones
social media
social media forensics
Metrics
Speech
stylometry
supervised learning-based
user anonymity
user identification
Writing
writing style
authorship attribution
Media
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
Human behavior
habit peculiarities
Forensics
feature extraction
distributed networks
Digital Forensics
context exploitation
Context
computational linguistics
authorship attribution algorithm
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 12:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Forensic Attribution in NoSQL Databases
Submitted by grigby1 on Mon, 03/05/2018 - 12:03pm
message authentication
survey
Structured Query Language
sensitive information
security of data
Security by Default
Scalability
pubcrawl
policy-based governance
Peer-to-peer computing
NoSQL databases
NoSQL
Access Control
Human Factors
Human behavior
Forensics
forensic attribution
database forensics
collaboration
cloud implementations
Cloud Computing
authorisation
authentication
attribute-based encryption
biblio
A Layered Graphical Model for Mission Attack Impact Analysis
Submitted by grigby1 on Tue, 02/27/2018 - 1:36pm
Human behavior
unanticipated cyber activities
sockets
Scalability
Resiliency
resilience
pubcrawl
NIST National Vulnerability Database
mission attack impact analysis
military missions
Metrics
Legged locomotion
layered graphical model
Human Factors
attack activities
graph theory
graph levels
Forensics
forensic investigators
Digital Forensics
Cyber Dependencies
Conferences
Computational modeling
Compositionality
Common Vulnerability Scoring System
business missions
business data processing
attack logs
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »