Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider attacks
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
Power System Reliability Analysis Considering External and Insider Attacks on the SCADA System
Submitted by grigby1 on Wed, 05/05/2021 - 12:29pm
power systems
switched mode power supplies
SCADA Systems Security
SCADA systems
SCADA System Security
SCADA
Resiliency
resilience
Reliability
pubcrawl
Compositionality
power system reliability
Monte Carlo Simulation (MCS)
mean time-to-compromise (MTTC)
Local area networks
insider attacks
Human Factors
Human behavior
Cybersecurity
Computer crime
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
OT Network
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
internet
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
deep neural networks
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
SCADA Systems Security
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 4:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
1
2
next ›
last »