Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
hacker Web
Web sites
vulnerabilities
threats
threat identification
Servers
pubcrawl170109
online hacker communities
machine learning methodology
learning (artificial intelligence)
IRC channels
information retrieval techniques
information retrieval
carding shops
Hacker IRC
hacker forums
Cybersecurity
cybercriminals
cyber threat detection
cyber security
cyber defenses
Credit cards
Computer hacking
Computer crime
Communities
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
CLaaS
Cloud Computing
cloud computing system
Computer crime
Cybersecurity
cybersecurity lab as a service
education
IP networks
pubcrawl170109
security of data
Servers
virtual cybersecurity
virtual lab
virtualisation
Virtualization
virtualization technology
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 3:08pm
Science of Security
computer access
Cybersecurity
Science of Human Circumvention of Security
Science of Security
Workarounds
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 12:44pm
Science of Security
computer access
Cybersecurity
Science of Security
Workarounds
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 12:40pm
Science of Security
Science of Security
Workarounds
Cybersecurity
computer access
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »