Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
darknet
biblio
Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms
Submitted by grigby1 on Fri, 06/02/2023 - 4:30pm
pubcrawl
Analytical models
boosting
codes
cyber security
dark web
darknet
feature extraction
Human behavior
Human Factors
machine learning
network traffic
Prediction algorithms
Protocols
Training
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Weakness Identification and Flow Analysis Based on Tor Network
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
Router Systems Security
darknet
Human behavior
Metrics
network traffic analysis
policy-based governance
pubcrawl
resilience
security weaknesses
SVM
The Onion Router
biblio
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum
Submitted by grigby1 on Wed, 09/12/2018 - 11:16am
Collective Problem Solving
Crisis Social Interaction
Cybercrime
dark web
darknet
darkweb
Hidden Organization
Human behavior
Human Factors
pubcrawl
virtual organization
biblio
Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
pubcrawl
encryption
Human behavior
Information systems
internet
invasive software
legality
locker bot
malware
Metrics
Electronic mail
Ransomware
Resiliency
The Dark Net
Tor
trojan horse
Trojan horses
underground Web
Web threats
cryptolocker ransomware
bitcoin
bitcoin wallet
composability
Computer crime
Computers
consumer confidence
crypto virus
Cryptographic Protocols
Cryptography
Algorithm design and analysis
CTB locker
cyber crime
cyber ethics
cyber Laws
cyber wars
darknet
e-commerce
electronic commerce
biblio
Analysis of a #x201c;/0 #x201d; Stealth Scan From a Botnet
Submitted by BrandonB on Wed, 05/06/2015 - 10:22am
animation
botnet
Communication system security
darknet
Geology
internet
Internet background radiation
Internet telephony
IP networks
network probing
Network Telescope
Ports (Computers)
scanning
Servers
Telescopes
VoIP