Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 8:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
Human behavior
tools
Stakeholders
Scalability
resilience
pubcrawl
probable solution
Metrics
investigation
Internet technologies
internet
information forensics
Complexity theory
Digital Forensics
data privacy
Cyberspace
cybercriminals
cybercrime investigations
Cybercrime
cyber-scene
cyber scene
criminal profiling
Computer crime
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research
Submitted by aekwall on Wed, 05/01/2019 - 11:41am
monitoring systems
tools
Servers
security research
security of data
security applications
security
Resiliency
real-time systems
real-time cyber-physical system monitoring tool
real-time CPS monitoring tool
real-time constraints
Real time monitoring
publicly available monitoring tools
pubcrawl
physical phenomena
Human Behavior and Cybersecurity
Monitoring
MiniCPS-based case study
Metrics
Industrial Control Systems
human computer interaction
embedded systems
Cybersecurity
cyber-physical systems
cyber physical systems
CPS-MT
CPS simulations
computerised monitoring
computer architecture
composability
Human behavior
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 9:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
cyber situational awareness
visualisation techniques
Royal Military Academy
operational picture
military commanders
Information systems
CyHSA
CyCOP
Cyber Hybrid Situational Awareness
cyber defense situational awareness
cyber defence implications
cyber common operational picture
Belgium
3D visualization
3D Operational Picture
situational awareness
security
Data visualization
data visualisation
Security Metrics
Comparative Analysis
Three-dimensional displays
Servers
military communication
military computing
composability
Resiliency
Metrics
pubcrawl
resilience
tools
security of data
biblio
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
password
tools
text-based authentication mechanisms
situational awareness
Resiliency
resilience
pubcrawl
password security policies
password cracking tools
password cracking
password auditing tools
password auditing policy
password auditing
auditing results
Organizations
next-generation password auditing toolkits
Metrics
Guidelines
Force
Dictionaries
cyber situational awareness
cyber security
cyber defence toolkits
composability
authorisation
« first
‹ previous
…
45
46
47
48
49
50
51
52
53
…
next ›
last »