Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
indicators of compromise
biblio
A Machine Learning based Threat Intelligence Framework for Industrial Control System Network Traffic Indicators of Compromise
Submitted by aekwall on Thu, 06/09/2022 - 10:39am
industrial control
scalable systems
network traffic
IOC
indicators of compromise
ICs
industrial control system
threat intelligence
critical infrastructure
integrated circuits
control systems
Decision trees
telecommunication traffic
Industrial Control Systems
Resiliency
Scalability
pubcrawl
machine learning
biblio
The Making of Indicator of Compromise using Malware Reverse Engineering Techniques
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Metrics
tools
static analysis
Software
security
Scalability
reverse engineering
resilience
pubcrawl
Packed Malware
Malware Analysis
Malware Threat
malware
indicators of compromise
computer architecture
BIOS
Resiliency
Human behavior
Predictive Metrics
privacy
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 9:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm