Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Insider Threats
biblio
Securing Trajectory based Operations Through a Zero Trust Framework in the NAS
Submitted by grigby1 on Thu, 03/04/2021 - 3:07pm
TBO infrastructure
network perimeter
operating costs
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
strong boundary security protections
national airspace system
TBO objectives
time-based management data
tool availability
trajectory based operations
verify approach
zero trust
zero trust framework
ZTF theory
FAA systems
aerospace computing
air traffic control
aircraft communication
authorisation
boundary protections
castle-moat approach
critical data
ever-evolving threat sophistication
access network data
FAA Telecommunications Infrastructure network
Human Factors
hybrid ZTX approach
Insider Threats
internal network devices
NAS Zero Trust
NAS.ZTF
biblio
Insider Threat Detection Using Natural Language Processing and Personality Profiles
Submitted by aekwall on Mon, 02/22/2021 - 1:39pm
Linguistics
third-party cloud service
psychological profiles
proof-of-concept detection system
personality profiles
personality insights
personal content
Insider Threats
taxonomy
psychology
Insider Threat Detection
natural language processing
computer security
Companies
pubcrawl
Human behavior
Resiliency
Scalability
Cloud Computing
security of data
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
Personnel
trusted human framework
Trusted Computing
software engineering
security of data
risk mitigation
risk management
pubcrawl
potential employees
cyclic process
People Process and Technology
on-going process
insider threats risk
Insider Threats
human trust
Human behavior
enterprise risk management activities
biblio
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
data tampering
Linux Operating System Security
Universal Serial Bus
software portability
security and privacy
portability
permanent record deletion
operating systems
operating system security flaws
live Linux distribution device
Live Devices
live device attacks
Linux operating system
security of data
Insider Threats
Predictive Metrics
File systems
microsoft windows
data theft
Metrics
composability
pubcrawl
Resiliency
Linux
mobile computing
security
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
object behaviour
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
data collection capabilities
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
Bluetooth
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
IoT
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Training
temporal data ex-filtration threat detection
Temporal Attacks
Insider Threats
Data Analytics for Security
anomaly detection techniques
anomalous access detection
relational database security
unauthorized access
relational databases
data theft
Anomaly Detection
Inspection
query processing
Metrics
composability
pubcrawl
Human behavior
Resiliency
feature extraction
real-time systems
authorisation
Monitoring
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
« first
‹ previous
1
2
3
4
next ›
last »