Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 10:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 10:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 10:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
Smarter Smart Contract Development Tools
Submitted by grigby1 on Fri, 03/27/2020 - 10:29am
program debugging
usability of programming languages
tools
software tools
software engineering
Software
smarter smart contract development
smart contracts
security vulnerabilities
security of data
Safe Coding
Resiliency
resilience
pubcrawl
Programming Language
blockchain
program compilers
policy-based governance
Metrics
Human Factors
Human behavior
contracts
Computer languages
Computer bugs
collaboration
buggy code
blockchain software engineering tool set
blockchain software development tools
blockchain platforms
blockchain environments
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 12:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »