Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
Behavior Modeling for Cybersecurity
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
behavior modeling
cyber security incidents
Cybersecurity
faulty code
Human behavior
human behaviors
human behaviour modeling
Human Factors
Personnel
pubcrawl
scanning devices
security
security of data
soft factors
software developers
system administrators
biblio
Relating Factors of Tertiary Institution Students’ Cybersecurity Behavior
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
Internet skills
validated cybersecurity factors
tertiary institutions students
tertiary institution students
SPSS version 25
security self-efficacy
security of data
security
response efficacy
pubcrawl
perceived vulnerability
perceived severity
perceived benefits
perceived barriers
peer behavior
computer skills
Internet exposure
internet
Human Factors
Human behavior
further education
cybersecurity training
cybersecurity issues
cybersecurity behaviors of tertiary institution students
cybersecurity behaviors
cybersecurity behavioral factors
Cybersecurity
cues to action
Correlation analysis
biblio
Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
India
User behaviour
smartphone users
Smartphone user
smart phones
security
secure behaviour
pubcrawl
protection motivation theory
planned behaviour
mobile computing
behaviour change
Human Factors
Human behavior
Human aspect
fogg behaviour model
cybersecurity behaviour
cybersecurity awareness program
Cybersecurity
Computer crime
behavioural science
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 12:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 10:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
performance evaluation
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
IoT devices
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
Anomaly Detection
IoT Botnets
invasive software
Internet of Things
deep-learning classifiers
deep learning
Cybersecurity
confidentiality integrity and availability attacks
computer network security
composability
Classification algorithms
CIA attacks
botnets
Botnet detection
botnet activity
botnet
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »