Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Securing Email for the Average Users via a New Architecture
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
Human Factors
Servers
Scalability
Resiliency
Public key
pubcrawl
privacy protection
privacy
PKI Trust Models
PKI
Metrics
internet
communication medium
Human behavior
encryption
email security
Email Protocols
email messages
email encryption
Electronic mail
data privacy
cyber security
Cryptography
consumer
biblio
DoS Attacks in Electrical Cyber-Physical Systems: A Case Study Using TrueTime Simulation Tool
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
predictive control
Metrics
model predictive control algorithm
networked control systems
power grid system
power grid vulnerability analysis
power grids
power system control
power system security
Mathematical model
pubcrawl
resilience
Resiliency
sensors
TrueTime Network Library
TrueTime simulation tool
TureTime Network Library
Vulnerability Analysis
Decentralized Control
Communication networks
composability
Compositionality
computer network security
control instructions actuators
Control Strategy
cyber security
cyber-physical systems
actuators
decentralized control strategies
distributed control
distributed control strategies
DoS attack
DoS attacks
ECPSs
electrical cyber-physical systems
Generators
biblio
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
CPS resilience
Compositionality
cyber security
Human behavior
Networked Control Systems Security
pubcrawl
resilience
Resiliency
SCADA system
SCADA systems
security
security controls
Threat Modeling
vulnerability assessment
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
A Method of Cyber Security Vulnerability Test for the DPPS and PMAS Test-Bed
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
operating nuclear plant control system
vulnerability scanning tool
Vulnerability
tools
threat vectors
test-bed
security of data
pubcrawl
privacy
PMAS test-bed
Plant Monitoring Annunciator System (PMAS)
Application software
Monitoring
Metrics
maintenance engineering
DPPS test-bed
Digital Plant Protection System (DPPS)
cyber security vulnerability test
cyber security evaluation process
cyber security
control systems
computer security
biblio
Extracting Cyber Threat Intelligence from Hacker Forums: Support Vector Machines versus Convolutional Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
learning (artificial intelligence)
vital information
threat vectors
text classification
Support vector machines
relevant threat intelligence
relevant threat information
pubcrawl
privacy
pattern classification
Open-Source Intelligence
Metrics
machine learning
Learning systems
Computer crime
hacker forums
hacker forum
feedforward neural nets
error-prone process
Data mining
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security threats
cyber security
convolutional neural networks
Convolutional Neural Network algorithms
Computer hacking
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Autoencoder-Based Feature Learning for Cyber Security Applications
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
invasive software
Vectors
Training
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Metrics
malware classication
malware
machine learning
learning (artificial intelligence)
AE
Intrusion Detection
feature vector
feature learning
feature extraction
encoding
cyber security
computer security
computer network security
autoencoder
Artificial Neural Networks
anomaly intrusion detection
biblio
Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
policy-based governance
network security
neural chips
Neural networks
neuromorphic cognitive computing
neuromorphic computing
neuromorphic computing system
Neuromorphics
Neurons
NSCS
physical neuromorphic chip
network intrusion detection
power efficient neuromorphic processors
pubcrawl
resilience
Resiliency
security of data
synaptic weights
Training
TrueNorth System
unsupervised deep learning
DVF
auto encoder
Biological neural networks
Cognitive Computing
computer security
crossbar weight
cyber security
Deep Neural Network
discrete values
discrete vector factorization
Artificial Neural Networks
hybrid encoding
IBM neurosynaptic core simulator
IBM TrueNorth neurosynaptic chip
IDS
Intrusion Detection
learning (artificial intelligence)
machine learning
Matrix decomposition
Metrics
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »