Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
India
User behaviour
smartphone users
Smartphone user
smart phones
security
secure behaviour
pubcrawl
protection motivation theory
planned behaviour
mobile computing
behaviour change
Human Factors
Human behavior
Human aspect
fogg behaviour model
cybersecurity behaviour
cybersecurity awareness program
Cybersecurity
Computer crime
behavioural science
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Attacking Key Management in Ransomware
Submitted by grigby1 on Wed, 03/17/2021 - 12:43pm
pubcrawl
targeted attacks
steady growth
Scalability
Resiliency
resilience
real-world ransomware
ransomware kill chain
Ransomware
public sector entities
public key cryptography
Public key
attacking key management
private sector entities
opportunistic attackers
NIST
memory attacks
invasive software
extracted keys
encryption
dynamically extracting decryption keys
concerning trends
Computer crime
Chained Attacks
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
financial data processing
Web page
USD
security
search engines
scam instances
scam analysis
Scalability
pubcrawl
internet
Human behavior
generic system
Generators
free bitcoins
fraud detection
automatic detection
Data mining
cyberattack
Cryptography
cryptocurrency
cryptocurrencies
Crawlers
Computer crime
blockchain analysis
blockchain
bitcoin-based scam monitoring systems
bitcoin generator scam
bitcoin addresses
bitcoin
BGS
biblio
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
cyber threat intelligence
security
Scalability
pubcrawl
Organizations
monetary value
market capitalization
Human behavior
financial data processing
exchange breach
Ecosystems
attacks
cyber security threats
cyber security breaches
cyber security
cryptocurrency exchanges
cryptocurrencies
Computer crime
Bitcoin market value
Bitcoin exchange platforms
bitcoin
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »