Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deception
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 12:52pm
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
Oppositional Human Factors in Cybersecurity: A Preliminary Analysis of Affective States
Submitted by grigby1 on Thu, 09/29/2022 - 4:38pm
Qualitative Data Analysis
Oppositional Human Factors
deception
Affect and Emotions
Human Factors
psychology
software engineering
Cybersecurity
Task Analysis
computer security
Conferences
Human behavior
pubcrawl
critical infrastructure
biblio
Blind Attack Flaws in Adaptive Honeypot Strategies
Submitted by grigby1 on Thu, 06/09/2022 - 2:52pm
Network
adaptive
honeypot
deception
Optimized production technology
Resiliency
honey pots
threat
Human Factors
Adaptation models
Artificial Intelligence
Fingerprint recognition
Scalability
security
resilience
pubcrawl
adaptive systems
biblio
IoT Security Using Deception – Measuring Improved Risk Posture
Submitted by grigby1 on Thu, 08/12/2021 - 4:22pm
composability
deception
Decoys
Human behavior
IoT
IoT security
Metrics
networking
pubcrawl
resilience
Resiliency
security
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
Trust and Deception in Hypergame Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
Compositionality
Computer Theory and Trust
temporal hypergame model
model decision
misperception
hypergame theory
hypergame theoretic framework
conflict
attacker-defender hypergame
formal model
Atmospheric modeling
game theory
sensors
Temporal Logic
Games
Mathematical model
Decision Making
Computational modeling
composability
pubcrawl
deception
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
author identification
deanonymization
deception
Human behavior
Human Factors
Metrics
pubcrawl
stylometry
text obfuscation
biblio
Online Deception in Social Media
Submitted by willirn1 on Thu, 09/26/2019 - 3:41pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
Demystifying Deception Technology: A Survey
Submitted by willirn1 on Thu, 09/26/2019 - 3:37pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
1
2
3
4
5
6
next ›
last »