Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
Exploring the Dark Web for Cyber Threat Intelligence Using Machine Leaning
Submitted by grigby1 on Tue, 01/28/2020 - 1:38pm
Doc2Vec
tools
Resiliency
resilience
pubcrawl
privacy
natural language processing
malware
machine learning
machine leaning
learning (artificial intelligence)
intelligence
information security
artificial intelligence security
Data models
darkweb
dark web
cyberattack
cyber threat intelligence
cyber intelligence
Cyber Attacks
cyber attack techniques
counter measure
Computer crime
composability
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 1:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 9:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance
Submitted by grigby1 on Tue, 01/21/2020 - 10:32am
mission impact graph
security of data
security countermeasures
Scalability
Resiliency
resilience
ranking algorithm
pubcrawl
policy-based governance
network attacks
collaboration
mission impact assessment
Mission Assurance
Metrics
Information Assurance
Human behavior
graph theory
cyber space threat
Cyber Attacks
composability
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 10:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing
Submitted by aekwall on Wed, 12/18/2019 - 1:39pm
adversary activity
United States policy
transparent framework
standard methodology
rough-and-ready metrics
policy framework
persistent engagement
intercept-and-halt adversary cyber operations
forward defense
cyber policy
Cyber Operations
adversary cyber operations
security of data
cyber conflict
cyber deterrence
Deterrence
resilience
threat intelligence
Cyber Attacks
Metrics
pubcrawl
Human behavior
Scalability
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
system reliability
pubcrawl
resilience
Resiliency
security
security assessment
security of data
Simulation Platform
smart meters
strategic control
privacy platform
system resiliency
Temperature control
TES simulation
TESST
testbed
transactive energy
transactive energy security simulation testbed
transactive energy systems
distributed energy resources
blockchain
Computational modeling
cyber-attacks
Cyber Attacks
cyber-physical security
cyber-physical simulation platform
cyber-physical systems
data privacy
decentralized power system control problem
active distribution system operator
distributed power generation
distributed software platforms
financial markets
HVAC
power distribution economics
power distribution reliability
power engineering computing
power system security
biblio
Malware propagation effects on SCADA system and smart power grid
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
power engineering computing
smart power grids
Smart Grids
simulated smart power grid environment
sensors
SCADA Systems Security
SCADA systems
SCADA system
Resiliency
pubcrawl
power system security
power grids
power generation
composability
Phasor measurement units
openDSS
OMNeT++ simulator
malware propagation effects
malware
invasive software
Human behavior
grid computing
cyberattack
Cyber Attacks
critical infrastructures
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »