Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
User behavior
biblio
Towards a Model of User-centered Privacy Preservation
Submitted by grigby1 on Mon, 12/03/2018 - 12:17pm
pubcrawl
Cloud Computing
Metrics
Model-driven development
privacy
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
Privacy Protection Dashboard: A Study of Individual Cloud-Storage Users Information Privacy Protection Responses
Submitted by grigby1 on Wed, 09/05/2018 - 10:44am
pubcrawl
Cloud Computing
Control Theory
Human behavior
human factor
information privacy
item response theory
Metrics
privacy
protection motivation theory
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
Trust but Verify: Auditing the Secure Internet of Things
Submitted by grigby1 on Mon, 03/26/2018 - 12:56pm
resilience
web of trust
user privacy in the cloud
User behavior
Transport Layer Security
TLS-rotate and release
TLS-RAR
TLS 1.3
TLS
Scalability
Resiliency
auditing
pubcrawl
proxy
Networked Control Systems Security
Middlebox
Metrics
IoT
Internet of Things
Decrypt
composability
biblio
A Scalable and Privacy-Aware IoT Service for Live Video Analytics
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
Metrics
user privacy in the cloud
User behavior
Scalability
Resiliency
resilience
pubcrawl
privacy protection
Privacy Mediator
privacy
AI
Human Factors
human factor
Human behavior
face recognition
edge computing
cloudlet
Cloud Computing
Artificial Intelligence
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
Context Matters?: How Adding the Obfuscation Option Affects End Users' Data Disclosure Decisions
Submitted by grigby1 on Fri, 09/15/2017 - 10:45am
composability
Compositionality
computational intelligence
Cryptography
data obfuscation
mobile
privacy
pubcrawl
tracking
User behavior
file
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 2:21pm
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
Hard Problems
biblio
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 2:21pm
Science of Security
cyber-physical systems
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
« first
‹ previous
1
2
3
4
next ›
last »