Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
computer security
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
Measurement
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
resilience
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
unmanned aerial systems
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
Deriving cyber use cases from graph projections of cyber data represented as bipartite graphs
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Anomaly Detection
Bipartite graph
cyber security
graph analytics
IP networks
Measurement
Peer-to-peer computing
pubcrawl
Scalability
scalable
Scalable Security
security
Servers
situational awareness
biblio
Designing a Micro-moving Target IPv6 Defense for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
Metrics
testing
sensors
Resiliency
Reconnaissance
pubcrawl
Protocols
optimization
moving target defense
micromoving target IPv6 defense
Cooja simulation configuration
Limiting
IP networks
IoT devices
IoT
Internet of Things
internet
hardware testing
embedded systems
cyber security
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »