Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Informatics
biblio
Malware Family Fingerprinting Through Behavioral Analysis
Submitted by aekwall on Tue, 09/21/2021 - 11:07am
Informatics
Predictive Metrics
Malware Signature
malware detection
Fingerprinting
Fingerprint recognition
behavior analysis
Malware Analysis
dynamic analysis
security
malware
privacy
Human behavior
Resiliency
pubcrawl
Conferences
machine learning
biblio
Identifying the Development Trend of ARM-based Server Ecosystem Using Linux Kernels
Submitted by grigby1 on Tue, 08/17/2021 - 3:56pm
Linux operating system
Servers
Resiliency
resilience
pubcrawl
Open Source Software
Metrics
Market research
Linux Operating System Security
ARM-based server ecosystem
Linux kernel source
Linux
Kernel
Informatics
Ecosystems
development trend
composability
ARM64
biblio
A Cloud-based Mobile Healthcare Monitoring Framework with Location Privacy Preservation
Submitted by grigby1 on Thu, 07/08/2021 - 2:37pm
obfuscation
wearable computers
user privacy in the cloud
user privacy
Technological innovation
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
personal health monitoring system
ART
Monitoring
Metrics
location privacy
Informatics
data privacy
Crowdsensing
context-awareness
Cloud Computing
cloud
biblio
Efficient Conversion Scheme Of Access Matrix In CP-ABE With Double Revocation Capability
Submitted by aekwall on Tue, 05/25/2021 - 3:19pm
authorization
Cauchy matrix
Chinese remainder theorem
Cloud Computing
Conferences
CP-ABE
data privacy
encryption
Informatics
policy-based governance
pubcrawl
revocation
Scalability
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
biblio
Improving student learning performance in a virtual hands-on lab system in cybersecurity education
Submitted by grigby1 on Wed, 11/04/2020 - 1:58pm
learning outcomes
virtual hands-on lab system
Task Analysis
student learning performance
Servers
security of data
reading lab materials
pubcrawl
professional aspects
privacy
Logic gates
learning performance
computer aided instruction
learning activity
learning activities
lab tasks
Informatics
educational courses
education
cybersecurity education
cyber physical systems
computer security
computer science education
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
« first
‹ previous
1
2
3
4
5
next ›
last »