Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

insider attacker

biblio

Visible to the public Modeling of Insider Threat using Enterprise Automaton

Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
  • automata
  • psycho-social behaviors
  • novel unified model
  • nonhuman agents
  • insider threat modeling
  • insider attacker
  • insider agents
  • insider
  • Enterprise process
  • enterprise automaton
  • authorized privileges
  • security management
  • Silicon
  • Task Analysis
  • Metrics
  • authorisation
  • Attack detection
  • Computational modeling
  • privacy issues
  • data privacy
  • Resiliency
  • resilience
  • policy-based governance
  • Human behavior
  • pubcrawl
  • business data processing
  • security
  • Organizations
  • insider threat
biblio

Visible to the public Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity

Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
  • smart phones
  • pubcrawl
  • radio communication range
  • Resiliency
  • Scalability
  • security of data
  • sensitive command pushing
  • sensitive information learning
  • sensitive information pulling
  • shared office spaces
  • physical barriers
  • smartphone
  • stolen wearable threat
  • taking pictures
  • telecommunication security
  • text messages
  • unattended wearable devices
  • wearable computers
  • wearables security
  • wireless communication medium
  • Glass
  • attack activity
  • audio proximity
  • audio signal processing
  • authentication
  • Biomedical monitoring
  • Bluetooth
  • Electronic mail
  • electronic messaging
  • emails
  • active audio challenge
  • Google
  • Human behavior
  • human computer interaction
  • insider attacker
  • insider threat
  • mobile computing
  • phone calls
  • photos

Terms of Use  |  ©2023. CPS-VO