Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security information
biblio
Visible-Imperceptible Image Watermarking based on Reversible Data Hiding with Contrast Enhancement
Submitted by aekwall on Mon, 06/28/2021 - 11:40am
information security
intellectual property security
security information
reversible data hiding
image watermarking
Contrast Enhancement
intellectual property
Image Processing
smart devices
Resiliency
visualization
digital images
Watermarking
Robustness
policy-based governance
composability
pubcrawl
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 1:42pm
Metrics
Windows Operating System Security
universal system
the monitoring center
system monitoring
Servers
security of data
security information
Resiliency
resilience
received events
pubcrawl
Protocols
operating systems (computers)
operating systems
monitoring events
Windows operating system
Information systems
information security
Industrial engineering
event-forwarding technology
event sources
event management
event log analysis
event log
event forwarding technology
event collector
domain controller
computer security
composability
analysis of incidents
security
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 9:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC)
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
Metrics
VLC
Visible Light Communications Security
visible light communication
TOPSIS and The Game Theory
security of data
security information
security criteria
security
Scalability
right security problems
Resiliency
resilience
research project
pubcrawl
alternative methods
light emitting diodes
information security method
information security
Informatics
free-space optical communication
Decision Making
Data models
competency model
Communication by Visible Light (VLC)
business context
business communication
Bayesian Nets
Analytical models
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 1:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
Security in Wireless Sensor Networks: Key Management Module in EECBKM
Submitted by BrandonB on Wed, 05/06/2015 - 12:41pm
packet delivery ratio
WSN communication
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
security information
Secuirty
Routing protocols
Routing
authentication
node capture attack
Nickel
limited memory resource
key management module
key management
energy consumption
energy constraint
EECBKM
Cryptography
file
SoS and Hard Problems
Submitted by scherlis on Fri, 11/01/2013 - 11:05am. Contributor:
William L. Scherlis
Composition
Resilient Systems
Science of Security
Foundations
distributed systems
Frameworks
Mobile Applications
proofs
security information
Signatures
usability
User behavior
Academia
Presentation
SoS Quarterly Lablet Meeting, Sept '13 at CMU
Composition
CMU
NSA SoS Lablets Materials