Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
biblio
Challenges and Solutions in Cloud Forensics
Submitted by grigby1 on Fri, 03/22/2019 - 12:39pm
big data security
cloud
cloud forensics
cyber security
digital Investigation
Evidence
Metrics
pubcrawl
resilience
Resiliency
Scalability
Volatile Data
biblio
A comparison of cyber-security oriented testbeds for IoT-based smart grids
Submitted by aekwall on Mon, 03/18/2019 - 9:55am
pubcrawl
testing
testbeds
smart power grids
Smart Grids
smart grid testbeds
smart grid systems
smart grid security
smart grid practices
smart grid application
Smart Grid
security of data
Scalability
Resiliency
Communications technology
privacy
power engineering computing
Metrics
IoT
Internet of Things
information communication technologies
Hardware
cyber-security oriented testbeds
cyber-attacks
cyber security
conventional power grid system
computer security
biblio
Software-Defined Networking for Improving Security in Smart Grid Systems
Submitted by aekwall on Mon, 03/18/2019 - 9:55am
Resiliency
wide-area security management
traditional smart grid systems
traditional smart grid architecture
software-defined networking
software defined networking
smart power grids
Smart Grids
smart grid security
Smart Grid
smart decision making
security of data
SDN-based smart grid systems
SDN based solutions
SDN
Scalability
attacks
pubcrawl
Protocols
power system security
power engineering computing
Metrics
mentioned security threats
main cyber-security objectives
IP networks
distributed security
Decision Making
cyber security
control systems
computer architecture
Big Data
biblio
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security
Submitted by aekwall on Mon, 03/18/2019 - 9:54am
power system security
smart power grids
Smart Grids
smart grid security
smart grid hardware-in-the-loop co-simulation
Smart Grid Cyber Security
smart grid behavior
smart grid actions
Smart Grid
security
Scalability
Resiliency
real-time systems
pubcrawl
Protocols
co-simulation
power system
power engineering computing
Phasor measurement units
OpenStack-based evaluation framework
OpenStack-based communication network
Metrics
HIL co-simulation framework
hardware-in-the-loop
hardware-in-the loop simulation
cyber security
Cyber Attacks
computer network security
Communication networks
biblio
On Cyber Threats to Smart Digital Environments
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
CTI
Cyber Issues
cyber security
cyber threat intelligence
Metrics
privacy
pubcrawl
Threat Agents
Threat Landscape
threat vectors
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 3:21pm
Indexes
wireless access points
vulnerabilities
Smart Sensor
Smart Grid Sensors
Smart Grid
smart cities
Servers
Sensor Systems
security of data
Resiliency
pubcrawl
process algorithm
physical object
local real-time control activities
Intelligent sensors
Cloud Computing
Humidity
Human Factors
Human behavior
enterprise command
Data collection
cyber-physical systems
cyber security threats
cyber security
cyber physical sensors system security
cyber physical SENSOR Systems
Cryptography
CPSS threats
control center
computing platform
composability
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »