Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Supporting Cyber-Physical Security of Electric Power System by the State Estimation Technique
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
SCADA Systems Security
power system security
power system state estimation
pubcrawl
Reliability
Resiliency
SCADA
SCADA measurement
SCADA systems
power system reliability
security of data
state estimation
state estimation technique
state estimation tool
two-level SE
WAMS
WAMS measurement
composability
power system measurement
power engineering computing
Phasor measurement units
malicious attacks detection
Human behavior
Global Positioning System
EPS
energy system
Electric Power System
data corruption
cyberattacks identification
cyber-physical systems
cyber-physical security
cyber security
computer security
biblio
Privacy and Integrity Protection of Data in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
SCADA
Resiliency
Human behavior
pubcrawl
composability
cyber security
traffic obfuscation
Virtual private networks
SCADA Systems Security
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 9:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
biblio
Information Requirements for National Level Cyber Situational Awareness
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
Information Assurance
Stakeholders
situational awareness
security of data
Resiliency
resilience
pubcrawl
nonadversarial service management mistakes
national level cyber situational awareness
national information assurance exercise
Metrics
information requirements
information elements
adversarial behavior
government officials
Government
Electronic mail
cyber situational awareness-decision-makers
cyber security
critical infrastructures
critical infrastructure
Crisis Management
Computer crime
composability
common operational picture
adversarial cyberattacks
biblio
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
password
tools
text-based authentication mechanisms
situational awareness
Resiliency
resilience
pubcrawl
password security policies
password cracking tools
password cracking
password auditing tools
password auditing policy
password auditing
auditing results
Organizations
next-generation password auditing toolkits
Metrics
Guidelines
Force
Dictionaries
cyber situational awareness
cyber security
cyber defence toolkits
composability
authorisation
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »