Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Countering Cybersecurity and Counterfeit Material Threats in Test Systems
Submitted by aekwall on Mon, 09/28/2020 - 10:35am
mission critical electronics
AS5553
ATE system
ATEasy
commercial-off-the-shelf instrumentation
cybersecurity issue
LXI
military products
missile assemblies
aerospace products
secure software-based system
Security Technical Implementation Guide (STIG)
test development environment
test parameters
test sequences
TPS
undetected data breach
UUT
electronic warfare
data integrity
invasive software
Resiliency
pubcrawl
composability
Cybersecurity
program testing
Automated Secure Software Engineering
Data Security
ATE
automatic test equipment
malware
National security
automatic test software
automatic test systems
AD9100D
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by aekwall on Mon, 08/24/2020 - 11:46am
PCI DSS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
cloud-bases POS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
testing
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
security of data
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
biblio
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat
Submitted by grigby1 on Thu, 08/13/2020 - 4:22pm
pubcrawl
Internet Relay Chat (IRC)
IRC messages
IRC users
learning (artificial intelligence)
Monitoring
neural nets
one-class classification
pattern classification
internet relay chat
real-time systems
recursive deep learning
resilience
Resiliency
Scalability
social networking (online)
social networks
anonymous messaging
internet
electronic messaging
effective author verification
deep learning
deep autoencoder neural networks
Cybersecurity
cyber-crime
Computer hacking
Computer crime
autonomic IRC monitoring system
autoencoder
author verification approach
Author verification
arbitrary topics
anonymous users
profile
Terry Benzel
Cybersecurity
networking
SaTC
California
biblio
Lightweight Ciphers in Automotive Networks: A Preliminary Approach
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
lightweight cryptography
safe driving experience
preliminary approach
internal network
Electronic components
controller area network protocol
automotive security
automotive networks
controller area network
CAN protocol
controller area networks
weak point
computer network security
Lightweight Ciphers
controller area network security
microcontrollers
computer networks
Cybersecurity
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 9:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Cyber Mutual Assured Destruction as a System of Systems and the Implications for System Design
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
mutual assured destruction
systems analysis
system of systems
system design
security of data
Scalability
Resiliency
resilience
pubcrawl
cyber attack mutual assured destruction scenario
Human behavior
enemy attack
Deterrence
destructive capability
Cybersecurity
cyber warfare
cyber mutual assured destruction
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »