Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
5 ways deception tech is disrupting cybersecurity
Submitted by willirn1 on Tue, 09/24/2019 - 2:18pm
Cognitive Security
Cognitive Security in Cyber
deception
Cybersecurity
biblio
On Cyber-Enabled Information Warfare and Information Operations
Submitted by willirn1 on Tue, 09/24/2019 - 11:10am
Cognitive Security
Cognitive Security in Cyber
Cybersecurity
information warfare
influence operations
hybrid warfare
ambiguous warfare
biblio
Considerations for Human-Machine Teaming in Cybersecurity
Submitted by willirn1 on Tue, 09/24/2019 - 10:34am
Cognitive Security
Cognitive Security in Cyber
Human Machine Teaming
Cybersecurity
biblio
How human bias impacts cybersecurity decision making
Submitted by willirn1 on Tue, 09/10/2019 - 4:41pm
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Cybersecurity
Cognitive Security
Articles of Interest
C3E 2019
biblio
Cyber Deception: Overview and the Road Ahead
Submitted by Katie Dey on Mon, 09/09/2019 - 9:25pm
adaptive cyber defense techniques
adversarial mind manipulation
Cognitive Security
Computer hacking
computer security
cyber attack and defense
cyber deception
Cybersecurity
Cyberspace
moving target defense
primitive systems
proactive cyber defense
proactive strategies
security
security of data
Cognitive Security
Articles for Review
C3E 2019
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Submitted by grigby1 on Mon, 08/26/2019 - 10:09am
Internet-of-Things
Trusted Computing
service cross-layered system
sensors
security of data
security assessment as a service
SAaaS
Resiliency
resilience
pubcrawl
Monitoring
Medical services
IT healthcare ecosystem
Cloud Computing
Internet of Things
Healthcare
health care
digital-personalised-trusted healthcare
cybersecurity risk
Cybersecurity
cyber threats
cyber aware environment
Cross Layer Security
computer security
composability
biblio
A Unified Cybersecurity Framework for Complex Environments
Submitted by aekwall on Mon, 08/05/2019 - 9:44am
Scalability
Resiliency
Cybersecurity
security architecture
pubcrawl
Cloud Security
case study
integrated capability management
Information Centric Networks
biblio
Cyberattack to Cyber-Physical Model of Wind Farm SCADA
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
power systems
wind turbines
wind power plants
wind power penetration
Wind power generation
Wind farms
wind farm SCADA system
wind farm
supervisory control and data acquisition systems
Servers
security of data
SCADA Systems Security
SCADA systems
SCADA (Supervisory control and data acquisition)
Resiliency
pubcrawl
Anomaly Detection
power system security
Power system protection
power system control
power system
information and communication technology model
IEEE 9-bus modified system
Human behavior
Cybersecurity
cyberlayer
cyberattack to cyber-physical model
cyberattack
cyber-physical systems
cyber-physical system model
CPS (cyber-physical system)
composability
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 9:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »