Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
investigation
biblio
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
Submitted by grigby1 on Fri, 06/10/2022 - 1:47pm
security
pubcrawl
Analytical models
Scalability
Computational modeling
Artificial Intelligence
Forensics
investigation
explainable AI
mitigation
vulnerability detection
Man-machine systems
Human intelligence
human-in-the-loop
human in the loop
biblio
Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation
Submitted by grigby1 on Tue, 02/22/2022 - 1:23pm
Peer-to-peer computing
Virtual private networks
tools
telecommunication traffic
security
Scalability
Resiliency
resilience
pubcrawl
peer-to-peer security
peer to peer security
Peer-To-Peer
Metrics
IP networks
investigation
Human Factors
Evidence Detection
Digital Forensics
ADDIE Model
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
Elman
temporal conceptual graph
RBF networks
RBF
radial basis function networks
probable attack scenario
potential attack scenario
possible attack scenarios
investigation
hybrid neural network
high speed networks
global attack reconstruction process
Elman network
security of data
complex attack scenarios
big data-based attack scenarios reconstruction
Attack Scenario Graph
attack graphs
complex attacks
Predictive Metrics
Neural networks
graph theory
composability
pubcrawl
Resiliency
Big Data
biblio
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
Human behavior
tools
Stakeholders
Scalability
resilience
pubcrawl
probable solution
Metrics
investigation
Internet technologies
internet
information forensics
Complexity theory
Digital Forensics
data privacy
Cyberspace
cybercriminals
cybercrime investigations
Cybercrime
cyber-scene
cyber scene
criminal profiling
Computer crime
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
file
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by Heather Lucas on Tue, 06/03/2014 - 6:05pm. Contributors:
Lucas Layman
Sylvain David Diffo
Nico Zazworka
Forensics
Human Factors
investigation
log
visualization
HotSoS 2014
Industry
Presentations
Presentation Slides
Human and Societal Aspects of Security and Privacy