Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
A review of data analytics techniques for effective management of big data using IoT
Submitted by grigby1 on Tue, 04/27/2021 - 1:49pm
tools
security
IoT
pubcrawl
performance evaluation
data privacy
Big Data
Data Security
cloud
data analysis
big data security in the cloud
System performance
data management
Data Analytics
biblio
Metrics to Meet Security Privacy Requirements with Agile Software Development Methods in a Regulated Environment
Submitted by grigby1 on Tue, 04/27/2021 - 1:40pm
real-time and embedded systems
US Department of Defense
tools
Software measurement
Software
security
Scalability
Resiliency
resilience
Agile software development
pubcrawl
Metrics
Iterative methods
Design tools and techniques
data privacy
Communication system security
Big Data
biblio
Information Security in M-learning Systems: Challenges and Threats of Using Cookies
Submitted by grigby1 on Tue, 04/27/2021 - 1:15pm
tools
privacy
pubcrawl
Human behavior
resilience
Resiliency
information security
Metrics
Browsers
Compositionality
Mobile handsets
Browser Security
Electronic learning
cookies
m-learning
biblio
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information
Submitted by aekwall on Tue, 04/27/2021 - 12:36pm
Scalability
security
Software
Resiliency
pubcrawl
privacy
tools
Data mining
Computer bugs
program analysis
fuzzing
Security Heuristics
predictability
Automated Testing
biblio
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces
Submitted by aekwall on Tue, 04/27/2021 - 12:33pm
Scalability
encryption
security
Electronic mail
Resiliency
pubcrawl
Cryptography
tools
usability
Phishing
Security Heuristics
predictability
usable secure email
user interface design
biblio
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
Submitted by aekwall on Tue, 04/27/2021 - 12:29pm
Scalability
Task Analysis
Adaptation models
Resiliency
Human behavior
pubcrawl
audit
Reinforcement learning
tools
Penetration Testing
Biological neural networks
Deep Neural Network
Security Audits
pentesting
q-learning
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 10:33am
Syntactics
Snort rule combinations
Snort community
public rulesets
open-source IDS system
network security software
IDS rule verification
IDS rule redundancy verification
commented rules
anomaly network traffics
Snort
IDS
resilience
tools
Semantics
Redundancy
Payloads
telecommunication traffic
composability
intrusion detection system
Protocols
computer network security
Resiliency
pubcrawl
IP networks
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
A Review of Mobile Forensic Investigation Process Models
Submitted by grigby1 on Thu, 04/08/2021 - 4:11pm
information forensics
reviews
redundant investigation processes
mobile-based services
mobile scenarios
mobile forensics field
mobile forensics
mobile forensic tools
mobile forensic investigation process models
MFIPMs
MF transitions
MF field
forensic practitioners
investigation process model
tools
mobile devices
Unified modeling language
smart phones
mobile computing
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
biblio
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Submitted by grigby1 on Thu, 04/08/2021 - 3:54pm
Resiliency
low-cost technical solutions
insider threat control deployment
insider risk mitigation
high-level categories
insider threat program
risk analysis
Metrics
Law
Software
tools
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
security
Organizations
insider threat
security of data
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »