Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Operating System Classification: A Minimalist Approach
Submitted by grigby1 on Wed, 08/11/2021 - 10:59am
composability
iOS Security
passive network reconnaissance
Operating system classification
Network reconnaissance
affiliation graphs
social networking (online)
operating systems
wireless networks
machine learning
Cybersecurity
Object recognition
Resiliency
resilience
Metrics
Human Factors
pubcrawl
IP networks
biblio
Taking advantage of unsupervised learning in incident response
Submitted by aekwall on Thu, 06/24/2021 - 10:55am
malware
feature extraction
machine learning
Resiliency
pubcrawl
composability
tools
Training
Cybersecurity
computer security
Data mining
Automated Response Actions
dimensionality reduction
quick incident response
biblio
Mobile security labware with smart devices for cybersecurity education
Submitted by grigby1 on Tue, 05/25/2021 - 1:35pm
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
Educational institutions
labware
Mobile communication
Mobile Security
privacy
pubcrawl
smart mobile device
smart phones
biblio
AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs
Submitted by grigby1 on Tue, 05/25/2021 - 1:35pm
AI
Bibliographies
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
machine learning
MOOC
privacy
pubcrawl
systematic literature review
Systematics
biblio
A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)
Submitted by grigby1 on Tue, 05/25/2021 - 1:34pm
Computer crime
cyber education
cyber physical systems
Cybersecurity
cybersecurity assurance
cybersecurity audit
cybersecurity audit model
cybersecurity controls
cybersecurity domains
cybersecurity education
Guidelines
information security
Organizations
privacy
pubcrawl
standards
biblio
An extended perspective on cybersecurity education
Submitted by grigby1 on Tue, 05/25/2021 - 1:34pm
Adaptation models
Biological system modeling
computer security
Computers
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
privacy
pubcrawl
User Models
biblio
Incorporating SCADA Cybersecurity in Undergraduate Engineering Technology Information Technology Education
Submitted by grigby1 on Tue, 05/25/2021 - 1:33pm
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
Engineering students
ICs
industrial control
information technology
integrated circuits
Knowledge engineering
PLCs
privacy
pubcrawl
SCADA
biblio
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA
Submitted by aekwall on Thu, 05/13/2021 - 10:49am
Electronic mail
Human behavior
pubcrawl
composability
Metrics
Sociology
Statistics
Cybersecurity
Companies
computer security
attribution
Biological system modeling
Blame Attribution
risk communication
biblio
Power System Reliability Analysis Considering External and Insider Attacks on the SCADA System
Submitted by grigby1 on Wed, 05/05/2021 - 11:29am
power systems
switched mode power supplies
SCADA Systems Security
SCADA systems
SCADA System Security
SCADA
Resiliency
resilience
Reliability
pubcrawl
Compositionality
power system reliability
Monte Carlo Simulation (MCS)
mean time-to-compromise (MTTC)
Local area networks
insider attacks
Human Factors
Human behavior
Cybersecurity
Computer crime
biblio
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis
Submitted by grigby1 on Tue, 04/27/2021 - 1:40pm
Measurement
Semantics
security
Scalability
Resiliency
resilience
Reinforcement learning
pubcrawl
Metrics
Malware Analysis
malware
machine learning algorithms
Knowledge graphs
Cybersecurity
computer security
Big Data
Artificial Intelligence
graph theory
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »