Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Early Combined Safety - Security Defense in Depth Assessment of Complex Systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:27pm
Large-scale systems
Unified modeling language
traditional security research
tools
system engineer
system design life-cycle phases
security design weaknesses
security defenses
security attributes
security assessments
security
Scalability
Safety
Resiliency
resilience
pubcrawl
additional system complexity
interdisciplinary system dependencies
inter-system dependencies
Human behavior
expert systems
early conceptual design
early assessment
dependency model
defense in depth
critical infrastructures
concurrent safety
computer security
complex systems
complex system
complex critical infrastructures
combined Safety - Security Defense in Depth Assessment
biblio
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Submitted by grigby1 on Mon, 03/29/2021 - 12:15pm
privacy
user interface management systems
user interface design
user experience
usable security and privacy
tools
security perceptions
Scalability
pubcrawl
Protocols
cognitive science
Perceived security
Human Factors
human computer interaction
expert systems
ethical concerns
ethical aspects
encryption
Electronic mail
Cryptography
biblio
Facial recognition and 3D non-rigid registration
Submitted by grigby1 on Mon, 03/29/2021 - 12:04pm
iterative closest points (ICP)
tools
Three-dimensional displays
Resiliency
resilience
resampling method
pubcrawl
point clouds
nonrigid Iterative Closest Point algorithm
non-rigid ICP
Neural networks
neural nets
nanotechnology
Metrics
Iterative methods
3D nonrigid registration
image registration
human faces
human face recognition
Human behavior
facial recognition performance
facial recognition
facial expressions
face recognition
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
canonical face representation
3D point clouds
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
A Study of Evaluation Methods of WEB Security Threats Based on Multi-stage Attack
Submitted by grigby1 on Wed, 03/17/2021 - 11:43am
Formal Specification
Chained Attacks
Web security threats
Web application services
security vulnerability model
security specification
Security Evaluation
multistage attack
Measures
Kill Chain
Classified protection
Reconnaissance
Internet services
tools
web services
internet
Data models
Scalability
Analytical models
Resiliency
resilience
pubcrawl
Servers
security
security of data
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 11:40am
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »