Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
CyRIS: A Cyber Range Instantiation System for Facilitating Security Training
Submitted by grigby1 on Fri, 05/19/2017 - 12:55pm
cyber range
cyber-security practice
Cybersecurity
cybersecurity education
Human behavior
pubcrawl
biblio
Towards a 3-D Approach to Cybersecurity Awareness for College Students
Submitted by grigby1 on Fri, 05/19/2017 - 12:55pm
Awareness
college
Cybersecurity
Human behavior
pubcrawl
students
three-dimensions
biblio
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
Submitted by grigby1 on Fri, 05/19/2017 - 12:55pm
collaboration
composability
Compositionality
Control System
Cybersecurity
cybersecurity education
Forensics
Human behavior
Metrics
PCCC
pubcrawl
Resiliency
SCADA
SCADA Systems Security
Scalability
biblio
Dependency Graph Analysis and Moving Target Defense Selection
Submitted by grigby1 on Thu, 05/18/2017 - 1:44pm
attack graphs
attack surface
composability
Cybersecurity
dynamic defense
Dynamical Systems
graph theory
Malware Analysis
Metrics
moving target defenses
pubcrawl
Resiliency
biblio
Impact of the Physical Web and BLE Beacons
Submitted by grigby1 on Wed, 05/17/2017 - 12:51pm
eddystone
Scalability
Resiliency
pubcrawl
physical web
Metrics
ibeacon.
Human behavior
eddystone-url
beacons
cybersecurity education
Cybersecurity
computer security
composability
collaboration
bluetooth security
Bluetooth
BLE
biblio
Is domain highlighting actually helpful in identifying phishing webpages?
Submitted by rproctor on Sat, 04/08/2017 - 4:30pm
Cybersecurity
Decision Making
information processing
Phishing
Round 2 Projects
warnings
Round 2 Projects
biblio
Towards Security Metrics-supported IP Traceback
Submitted by grigby1 on Mon, 04/03/2017 - 10:32am
Big Data
big data security
big data security metrics
Cybersecurity
Metrics
Network Security Architecture
pubcrawl
Security by Default
Security Metrics
traceback
biblio
Is domain highlighting actually helpful in identifying phishing webpages?
Submitted by rproctor on Sat, 04/01/2017 - 4:14pm
A Human Information-Processing Analysis of Online Deception Detection
Cybersecurity
Decision Making
information processing
Phishing
warnings
A Human Information-Processing Analysis of Online Deception Detection
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »