Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
Decision-Making Biases and Cyber Attackers
Submitted by grigby1 on Thu, 09/29/2022 - 4:39pm
sunk cost
Peltzman effect
loss aversion
functional fixedness
default effect
aversion to ambiguity
cyber warfare
Costs
Cybersecurity
Software measurement
Decision Making
delays
Computer crime
Conferences
Human behavior
pubcrawl
biblio
Anomaly-based Intrusion Detection System Using Fuzzy Logic
Submitted by grigby1 on Fri, 09/16/2022 - 4:47pm
feature extraction
security
Intrusion Detection
pubcrawl
Metrics
resilience
Computer crime
information technology
Fuzzy logic
Open Source Software
denial-of-service attack
Feature Selection
Resiliency
distributed denial of service attack
intrusion detection system
biblio
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains
Submitted by grigby1 on Fri, 09/09/2022 - 3:35pm
security
Supply Chain
pubcrawl
resilience
Resiliency
privacy
Computer crime
power system faults
Power system protection
cyber
supply chains
Lenses
military
supply chain security
cyber-security.framework
Systems-of-Systems
biblio
A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph
Submitted by grigby1 on Fri, 08/26/2022 - 3:06pm
cyber security risk assessment
security
Scalability
risk management
Resiliency
pubcrawl
Information systems
Human Factors
Human behavior
Security Risk Management
Control Theory
control systems
Computers
Computer crime
complex networks
complex network theory
Communication-Based Train Control
attack graph
biblio
Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection
Submitted by grigby1 on Fri, 08/26/2022 - 10:57am
metadata
Time factors
security
Scalability
Resiliency
resilience
real-time systems
Profibus-DP
Production
pubcrawl
Industrial Serial-based networks
industrial facilities
Human behavior
expert systems
cyber security
Computer crime
anomaly detection systems
biblio
Practical Approach of Security Enhancement Method based on the Protection Motivation Theory
Submitted by grigby1 on Fri, 08/12/2022 - 2:24pm
protection motivation theory
trust
Stress
software engineering
security stress
security enhancements
Resiliency
resilience
pubcrawl
information theoretic security
Organizations
information security
Human behavior
Computing Theory
Computer crime
composability
Artificial Intelligence
biblio
Improving Classification Trustworthiness in Random Forests
Submitted by grigby1 on Wed, 08/03/2022 - 4:13pm
machine learning algorithms
pubcrawl
Conferences
Medical services
Computer crime
composability
Reliability
trustworthiness
Bayes methods
random forests
Bayesian networks
Classification Trustworthiness
Clinical Decision Support Systems
biblio
A Multi-Layered Defense Approach to Safeguard Against Ransomware
Submitted by aekwall on Thu, 07/14/2022 - 4:20pm
Ransomware
Web Filtering
layered defense
email security
antivirus
Antimalware
DNS
pubcrawl
cyber security
malware
security
composability
Resiliency
Metrics
Conferences
Computer crime
tools
Medical services
Training
biblio
Study on Systematic Ransomware Detection Techniques
Submitted by aekwall on Thu, 07/14/2022 - 4:19pm
Systematics
osquery
open-source EDR
Open Source hids SECurity (OSSEC)
Google rapid response
endpoint detection and response (EDR)
ransomware detection
pubcrawl
Ransomware
Internet of Things
composability
Resiliency
Metrics
feature extraction
Linux
Computer crime
tools
biblio
Managing Cyber Security with Quantum Techniques
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
pubcrawl
Scalability
Computer crime
Planning
Computers
quantum computing
Quantum mechanics
Quantum Key Distribution
Post-quantum cryptography
quantum computing security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »