Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Metrics
Sniffles
situational awareness
security systems
Resiliency
Regular expressions
regular expression processing capability
Regexbench
pubcrawl
performance evaluation
PCRE
pattern matching
composability
Handheld computers
deep packet inspection
decision maker mission completeness
Cybersecurity
cyber threats
cyber situational awareness enhancement
cyber situational awareness
Cyber Operations
computer security
computer network security
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 10:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
Testbed-based performance evaluation of Attack Resilient Control for AGC
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
power system control
AGC
attack resilient control
automatic generation control
computer security
control engineering computing
cyber-physical security
Cybersecurity
domain-specific anomaly detection
electric power grid
Frequency measurement
Load modeling
model-based mitigation
power grids
under-frequency load shedding
power system measurement
power system security
power systems
PowerCyber testbed
pubcrawl
real-time systems
Resiliency
Resilient Security Architectures
security of data
stealthy attack template
system-wide instability
testbed-based performance evaluation
biblio
Improving the effectiveness and efficiency of dynamic malware analysis with machine learning
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
malware
static analysis
sandbox environment
Resiliency
pubcrawl
privacy
Predictive models
pattern classification
Metrics
malware detection
malware classification
Malware Analysis
Analytical models
machine learning
learning (artificial intelligence)
invasive software
information extraction
Human behavior
feature extraction
Dynamic Malware Analysis
dynamic malware
Data mining
Cybersecurity
computer security
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
Scenarios using situation awareness in a simulation environment for eliciting insider threat behavior
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Insider Threats
usability
Stress
Situation Awareness
simulation environment
simulation
security of data
Resiliency
pubcrawl
policy-based governance
Particle measurements
Metrics
IT behavior
active indicators
insider threat behavior
insider threat
Human Factors
Human behavior
Government
gaze tracking
Decision support systems
deception
Cybersecurity
collaboration
Atmospheric measurements
AI
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
A Maginot Line in Cyberspace: The Binding Operational Directive BOD-18-01 DMARC Mandate
Submitted by rzager on Mon, 10/30/2017 - 5:12pm
Cybersecurity
Maginot Line
Phishing
spearphishing
BOD-18-01
DMARC
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »