Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/23/2020 - 3:59pm
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
cyber physical systems
cyber security
composability
rop attacks
real time systems
schedulability analysis
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
Cyber KPI for Return on Security Investment
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
cyber-attacks
security of data
Security Metrics
security investment
RoSI
ROI
Return on Security Investment
return on investment
pubcrawl
Metrics
cyber dashboard
cyber-attack
cyber subject matter experts
cyber security return
cyber security reports
cyber security incident
cyber security benefits
cyber security
cyber KPI
cyber incidents
biblio
Quantile based risk measures in cyber security
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data breach information
Security Risk Estimation
value at risk estimation
Value at Risk
tail value at risk
Risk measures
quantile based risk measures
Privacy Rights Clearinghouse
pricing cyber insurance contracts
insurance data processing
insurance companies
financial sector
security of data
cyber value at risk
cyber risk
Chronology of data breaches
Human Factors
risk management
Metrics
pubcrawl
Resiliency
cyber security
data privacy
Scalability
biblio
Research on the Development Trend and Auditing Mode of High Security Enterprise Intranet Security Audit
Submitted by aekwall on Mon, 03/09/2020 - 11:04am
enterprise intranet
Security Audits
security auditing
safety supervision
risk self-identification
intranets
intranet users
Internal Audit
high security enterprise intranet security audit
computer network security
behavior-based security audit mode
auditing
security audit
Scalability
pubcrawl
Human behavior
Resiliency
cyber security
biblio
Cyber-Physical Resiliency for Islanded Microgrids
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
cyber security
islanded mode
microgrid
photovoltaic and diesel generation
pubcrawl
resilience
Resiliency
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »