Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
STIX
biblio
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
information forensics
Actionable Cyber Threat Information
Autopsy
Compositionality
Conferences
Digital Forensics
Electronic mail
Incident Investigation
Information Reuse
Object recognition
Phishing
pubcrawl
Resiliency
security
STIX
tools
biblio
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
cybersecurity information exchange
versatile information exchange platform
STIX
shared threat data
shared data
privacy-preserving mechanisms
privacy preservation
information sharing
information management
information exchange platform
information exchange
CYBEX-P
cybersecurity techniques
cybersecurity information sharing platform
cybersecurity information exchange with privacy
privacy
Cybersecurity
cyber-information exchange
cyber threats
cyber defense
Privacy Policies
computer security
Databases
Scalability
data privacy
Human behavior
pubcrawl
Servers
Organizations
security of data
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior