Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Data Anonymization: K-anonymity Sensitivity Analysis
Submitted by grigby1 on Thu, 01/28/2021 - 1:01pm
pubcrawl
Human behavior
k-anonymity
k-anonymity sensitivity analysis
local authorities
Metrics
open government data
personal data privacy
personal data protection
government data processing
resilience
Resiliency
sensitivity analysis
Social Justice
Sociology
Statistics
tools
anonymity
GDPR
further education
European General Data Protection Regulation
education
digitization process
data usability
Data protection
data privacy
data anonymization
data anonimization
composability
central governments
Brazilian higher education evaluation system
ARX k-anonymization
ARX
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 12:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Human behavior
usability
tools
security
resilience
Metrics
malware
machine learning
Human Factors
Security Heuristics
Government
composability
Analytical models
Air gaps
pubcrawl
predictability
Scalability
Resiliency
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
A Social Network Analysis and Comparison of Six Dark Web Forums
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
network centrality analysis
whistle-blowing
underground communities
tools
Terrorism
structural patterns
social networking (online)
social network analysis tools
social network analysis
social interactions
pubcrawl
privacy
posting activities
post discussion data
online communities
central nodes post
interaction graphs
Instruction sets
Human Factors
Human behavior
Hacking
drugs
data privacy
dark Web forums
dark web
Cryptography
criminal interests
content ranging
Computer crime
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »