Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber threat landscape
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 12:00pm
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Text Mining
social networking site Twitter.com
social networking (online)
social media data mining
social media
situational awareness
sentiment analysis
security relevant information retrieval
security of data
Resiliency
resilience
Ransomware
pubcrawl
Metrics
composability
internet
information retrieval
Data mining
data analytics techniques
data analysis
data aggregation
cybersecurity tweet dataset
Cybersecurity
cyberattack
cyber threat landscape
cyber situational awareness information
cyber situational awareness
cyber risk
Cyber Attacks
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime